Volume 8, Number 12 • December 2008 Practical News and Strategies From AIS’s HIPAA Compliance Center Contents 3 If Safety Is an Issue, Privacy Officers Need Seat at the Table 5 Boston Hospital Works With Victims After Medical Identity Theft 5 CEs Dismiss Nosey Staff Members 7 Emergency Department Crowding, Fast Pace Create HIPAA Risks 8 Case Studies in Patient Privacy Problems and Their Solutions 11 Patient Privacy Court Cases 12 Privacy Briefs Privacy Protections Are Called Key as Enrollment Begins in Rhode Island HIN Just six weeks after enrollment began with a small outreach effort, some 800 individuals have joined a fledgling heath information network (HIN) in Rhode Island, which allows participants to select one of three levels of privacy protections and controls. And 80% of the members have opted to give their providers full access to their medical records through the HIN, which officials in the state say is “very encouraging.” Rhode Island’s HIN, called “currentcare,” has had “a very good start,” says Edward Quinlan, president of the Hospital Association of Rhode Island, which has been involved in currentcare’s development and implementation. The privacy and access levels “are a very important element,” adds Charles Kinney, chief operating officer of 100-bed Westerly Hospital in Rhode Island, which will soon begin enrolling patients in the HIN. Rhode Island’s early success demonstrates what experts believe is true: A nationwide health information network will succeed only if Americans join, and they will do so only if they feel their privacy concerns have been addressed and if they are able to exert some control over who sees their records. Currentcare is a regional HIN, also called a health information exchange, that would be joined with other regional HIEs to form a national network, which is currently under development with federal support. Currentcare is operated by the Rhode Island Quality Institute, which spent several years developing the program, culminating in the passage of a law, signed in September, formally establishing currentcare. continued on p. 10 Access past issues of RPP, key documents, and 30 narratives on privacy and security compliance at www.AISHIPAA.com. If you don’t have a Web site password, call 800-521-4323 or e-mail customerserv@aispub. com. Please whitelist [email protected] to ensure e-mail delivery. Editor Eve Collins Contributing Editor Neal Learner Executive Editor Angela Maas Express Scripts, Some Members Face Extortion Attempt After Data Breach Express Scripts, Inc. on Nov. 11 said that some of its clients had received anonymous letters threatening to expose the personal information of members following a data breach at the pharmacy benefit manager (PBM). Express Scripts, which is offering a $1 million reward for the arrest and conviction of the person or persons responsible for the extortion, said it believes the letters are connected to the extortion threat that it made public on Nov. 6. The latest letters are similar to the one that Express Scripts received in early October that threatened to post millions of members’ private information on the Internet if payment demands were not met, the PBM says. The original letter contained personal information on 75 members, including their names, dates of birth, Social Security numbers and, in some cases, prescription information, according to Express Scripts. While some observers say the PBM will likely lose business as a result of the breach, one Wall Street analyst says that he expects the PBM will be able to weather the PR storm. Other security experts, meanwhile, warn that all PBMs face similar data threats from organized criminals intent on exploiting their cyber weakness. continued Published by Atlantic Information Services, Inc., Washington, DC • 800-521-4323 • www.AISHealth.com An independent publication not affiliated with hospitals, government agencies, consultants or associations Report on Patient Privacy December 2008 Express Scripts noted that it and the FBI have launched investigations to determine who is behind the threat. In addition, the company on Nov. 11 said that it had hired Kroll, a prominent risk-consulting firm, to offer assistance to its members if they become victims of identity theft because of this incident. Express Scripts also says it will offer its members free identity-restoration services if needed. “Express Scripts is committed to the privacy and security of our members’ personal information, so a threat like this against our members is outrageous,” George Paz, president and CEO, said in a written statement. The company said it deploys “a variety of security systems” designed to protect members’ personal information. “However, as security experts know, no data system is completely invulnerable,” Paz asserted. The PBM says that it has identified where the data that were involved in the security breach were stored in its systems and has instituted enhanced controls. Express Scripts also maintained that it is unaware now of any misuse of members’ information. Subscribers to AIS’s HIPAA Compliance Center receive Report on Patient Privacy (ISSN: 1539-6487), which is published 12 times a year by Atlantic Information Services, Inc., 1100 17th Street, NW, Suite 300, Washington, D.C. 20036, 202-775-9008, www.AISHealth.com. Copyright © 2008 by Atlantic Information Services, Inc. All rights reserved. No part of this publication may be reproduced or transmitted by any means, electronic or mechanical, including photocopy, FAX or electronic delivery without the prior written permission of the publisher. Report on Patient Privacy is published with the understanding that the publisher is not engaged in rendering legal, accounting or other professional services. If legal advice or other expert assistance is required, the services of a competent professional person should be sought. Editor, Eve Collins; Contributing Editor, Neal Learner; Executive Editor, Angela Maas; Publisher, Richard Biehl; Marketing Director, Donna Lawton; Fulfillment Manager, Gwen Arnold; Production Coordinator, Russell Roberts Call Eve Collins at 800-521-4323 with story ideas for RPP. In addition to Report on Patient Privacy, subscribers to AIS’s HIPAA Compliance Center have access to www.AISHIPAA.com, with archives of past issues of the newsletter, links to government documents, and 30 searchable narratives written by experts in privacy and security compliance. Subscribers receive e-mail notification when a new issue of Report on Patient Privacy is posted on the Web site. Please whitelist [email protected] to ensure e-mail delivery. To order AIS’s HIPAA Compliance Center: (1) Call 800-521-4323 (major credit cards accepted), or (2) Order online at www.AISHealth.com, or (3) Staple your business card to this form and mail it to: AIS, 1100 17th St., NW, Suite 300, Wash., DC 20036. Payment Enclosed* ❑ $429 Bill Me ❑ $404 *Make checks payable to Atlantic Information Services, Inc. D.C. residents add 5.75% sales tax. The PBM so far has taken all of the right steps, says one security expert. “Textbook-wise, it looks like they’re doing everything possible [to address the issue],” says Harry B. Rhodes, director of practice leadership at the American Health Information Management Association. Among other things, the PBM has examined the audit trail, contacted affected customers and is working with the FBI on the investigation, he notes. Still, Rhodes says that now that Express Scripts has identified where the information came from in its database, the company should be able to start zeroing in on the people that had access to that information. He points out that 80% of data breaches are the result of an inside job. “They need to look at all of their employees, including their current employees,” he suggests. “The current best practice is [that] you do a background check on people who have access to this type of information, especially people who can download or move or copy large portions of information.” Robert Coffield, a health care attorney at Flaherty, Sensabaugh & Bonasso, PLLC, says companies cannot protect against every potential breach. “But you certainly need to meet a minimum threshold standard,” he says. “When you fall below that standard, that is when you are going to be subject to litigation.” Coffield did not offer any judgments as to the standards of Express Scripts’ security systems. PBMs Say They Are Prepared Other PBMs say they have multiple data security measures in place to ward off similar attacks. For its part, Medco Health Solutions, Inc. has institutionalized encryption technologies across the enterprise, and has conducted exhaustive reviews of all HIPAArelated data, according to spokeswoman Ann Smith. All laptop and desktop computers and business-to-business information is encrypted, and the company has authentication and access control on its data, in addition to data security protocols that are proprietary, she explains. “We are obsessive and extreme on security with layers of backups,” Smith says. Likewise, CVS Caremark Corp., to its knowledge, has not received a letter similar to the one described by Express Scripts, says CVS Caremark spokeswoman Christine Cramer. “CVS Caremark’s security programs are robust and have many internal controls that are designed to prevent unauthorized access to confidential information,” she says. Key components of CVS Caremark’s security program include the use of leading security technology, a comprehensive and consistently applied testing and validation program, and strict protocols related to user access to confidential data, Cramer says. EDITORIAL ADVISORY BOARD: Michael D. Bell, Esq., Mintz, Levin, Cohn, Ferris, Glovsky and Popeo, P.C., Wash. D.C.; JOHN BENTIVOGLIO, Esq., Arnold & Porter, Wash. D.C.; MICHAEL DOSCHER, Senior Manager, Global Healthcare Div., Covansys Corp., Glendale, Calif.; BRIAN GRADLE, Esq., Hogan & Hartson L.L.P., Wash., D.C.; REECE HIRSCH, Esq., Sonnenschein Nath & Rosenthal L.L.P., San Francisco., CA; JAMES PASSEY, MPH, Director, Compliance & Risk Management, Valley Health System, Hemet, Calif.; ERIC S. TOWER, Esq., Associate General Counsel, Advocate Health Care, Oak Brook, Ill. December 2008 Report on Patient Privacy Alan Paller, director of research at SANS Institute, a computer security training organization, says extortionists target companies whose paramount interest is keeping client information confidential. The health care industry represents a “perfect extortion target,” he adds. “It’s a massive crime, in the hundreds of millions of dollars,” he explains. Paller also asserts that it’s likely that other PBMs have been hit as well. “They may have managed to keep it quiet, or they don’t know yet,” he says. Companies Can Weather the Storm “Express Scripts has taken the appropriate steps to limit the damage” says Kemp Dolliver, a PBM securities analyst at Cowen and Company, LLC. “This situation looks like an embarrassment only absent evidence of a broader problem,” he says, pointing out that Medco also had a data breach related to a lost laptop computer back in 2006 that involved data on an Ohio agency with 4,600 members. “I don’t see competitors loudly touting this,” he says of the Express Scripts breach. “The company has taken some steps to get out in front of this with the impacted individuals and clients to mitigate the damage. They have to stay on top of this until they know the extent of the breach.” Rhodes suggests that Express Scripts publicize all of the things it has done to fix the problem. It will be especially important for the PBM to show that it has identified where its weaknesses are, has corrected them, and will have a process in place to do risk assessments constantly and watch for new weaknesses, Rhodes explains. “You win back the trust,” he says. “A company this large, they cannot afford this kind of situation. If they want to be successful, they’re going to come back with stronger controls.” Read more at www.esisupports.com. Contact Coffield at [email protected], Rhodes at Harry.rhodes@ ahima.org and Cramer at [email protected]. G This story is reprinted from AIS’s Drug Benefit News. For more information, go to www.AISHealth.com. If Safety Is an Issue, Privacy Officers Need Seat at the Table Chuck Burbank recently visited his 75-year-old father in the hospital, and was pleased to see he was wearing a yellow wristband and had a yellow star on his door, to indicate that he was at high risk for falls. “At his age, a fall could be devastating,” says Burbank, the HIPAA coordinator for St. Luke’s Episcopal Health System in Houston. Earlier this year, Burbank helped institute a similar program in one of the hospitals in his system, but it is only partly in place, with just the yellow bands. The hospital has not yet decided whether it will use red bands, which indicate allergies, nor purple, to be used for patients who do not want to be resuscitated. While the wrist bands and a star may seem like easy methods to improve patient safety — a professed national goal — they are not universally accepted. Despite a push by the American Hospital Association (AHA) and other groups, some hospitals have balked at using them, perhaps out of concern for patient privacy. Since the privacy rule went into effect in 2003, safety innovations have emerged that were not in effect or contemplated by the rule. Hospitals must make judgment calls about whether to implement those that may cause privacy concerns — and in some cases, they may be making the wrong decision out of fear or misinformation. As Burbank’s involvement shows, privacy officers have a vital role to play in these discussions about balancing patient safety and privacy. They should also build the kind of relationship with hospital administrators to ensure they will have a seat at the table, as Burbank has. Wrist Bands Are Similar to Signs St. Luke’s includes 700-bed Texas Medical Center and two smaller community hospitals. Before the wrist band program was implemented earlier this year, Burbank and other officials “worked through the privacy issues.” Burbank read the HIPAA regulation and guidance documents issued by HHS’s Office for Civil Rights (OCR), and concluded that the bands would be allowable as part of communications, and fall under incidental disclosures. “While they don’t talk about wrist bands, they do talk about signs, and I saw this as the same kind of thing,” he says. The bands do not contain any diagnostic information tied to a particular patient’s identity, he notes, and the system believes it has taken “reasonable precautions” to safeguard protected health information associated with patients who have the wrist bands. When Burbank gave the OK, the nursing staff was especially pleased with his ruling on the fall initiative. “They really wanted to implement the program, and they were very happy,” he says. He thinks it may just be a matter of time before the other two hospitals also use the wrist bands, but he is not certain whether they will adopt the full program. Burbank is correct in that the privacy rule does not address colored wrist bands or falling stars, and OCR has issued no specific guidance on the use of these programs. So RPP asked OCR to comment on the bracelets in particular, and on the emergence of other techniques in Go to www.AISHealth.com to sign up for FREE e-mail newsletters — AIS’s Health Business Daily and Government News of the Week. Report on Patient Privacy general that hospitals might be using to advance patient safety, plus whether they are legal under the privacy rule. “The use of colored bracelets to convey information to hospital staff is essentially no different than other techniques used by hospitals to provide patient information to physicians and staff,” Susan McAndrew, OCR’s deputy director for health information privacy, tells RPP. She says the bracelets are akin to “keeping clipboards containing patient information at the bedside.” But before implementing such a program, the hospital must “consider and properly apply” reasonable safeguards. She notes that if this is done, “incidental disclosures that might result from the bracelets being seen by others would be allowed.” Speaking generally, McAndrew says that the rule is “carefully balanced to provide strong privacy protections for individually identifiable health information without impeding the provision of quality health care.” She notes that the rule “affords health care providers with the flexibility they need to decide on the uses and disclosures of protected health information that are necessary for treatment in a hospital setting and to carry out other health care operations that support treatment of the individual.” But she cautions that the hospital must ensure that it also complies with other aspects of the rule, such as the minimum necessary requirement. Modifications May Be Needed The Texas Hospital Association has been working with its members for 18 months to adopt a wrist band program. “A few” hospitals have decided against it out of fears that it could violate the privacy rule, Starr West, senior director for policy analysis, tells RPP. The purple bracelet seems to have generated the most opposition, she says. “Some of our hospitals really felt strongly that using a purple wrist band was compromising patient privacy,” West says. “What we said was, `we are standardizing colors here, not necessarily asking anyone to use the bands. If you are using them, use the standard colors…and for heaven’s sake don’t use purple for anything else.’” Out of the interest of patient privacy and other concerns, some hospitals have modified the bracelet program. For example, upon admission, all patients at the three acute-care hospitals in the Scottsdale Healthcare System in Arizona are fitted with a red “bracelet,” upon which the nursing staff hand-writes their allergies or “NKA,” for no known allergies. In this way, no patients stick out for having a red bracelet, and no patients have refused to wear them since the program went into place in 2007, says Debbie Weller, Scottsdale’s manager for patient safety and regulatory issues, who helped implement the program. December 2008 In addition, changes were made to make the Do Not Resuscitate (DNR) part of the effort to be more palatable to Scottsdale physicians, who said the purple bracelets other hospitals use were “demeaning to patients,” Weller says. Instead, these patients have a “jewel” on their bracelet, a small purple triangle clipped to it permanently. Some who have a modified DNR have an orange triangle. Patients who are at risk of falls also have a yellow bracelet. The bracelet program was developed with representatives from various parts of the system, including its privacy compliance officer, she adds. “Our compliance staff were involved in the design and the rollout,” Weller says. Staying in Touch With Medical Staff Scottsdale staff frequently consult with their privacy officials to ensure they remain in compliance, especially when they want to implement a new program, put up new signage, or take some other action to improve patient care or treatment, Weller says. For example, the staff wanted to ensure that special instructions were readily accessible when patients were transferred and when the medical file was not always available. The compliance staff suggested using a twosided form with preprinted information on one side, and the individualized instructions written inside. When the paper was hung by the bedside, the PHI was hidden, Weller says. Since he joined St. Luke’s just over a year ago, Burbank has taken steps to form a good relationship with the nursing and other system staff. “I work very hard to let them know that I am a resource and that they should please use me,” he says. “I think it is very important for them to know who to ask if they have a question or issue.” Caregivers and other workers in the hospital “may encounter unique situations, and they may have trouble knowing what to do if it falls outside standard practices,” he says. “Things have changed so much” since the privacy rule went into effect. Privacy Is Not Static The privacy rule “should not be thought of as a stagnant document,” nor should the security rule, Burbank adds, noting that compliance officers also must keep abreast of changing state laws, which are often more stringent than the federal rules. Burbank says that the staff has asked him to weigh in on other similar issues. Medical device manufacturers, for example, had requested permission to use their equipment in system hospitals with real patients. So he worked with the staff to hammer out “showcase agreements” to cover these activities to ensure that Access newsletter archives, links to government documents and expert guidance at www.AISHIPAA.com. If you don’t already have a Web site password, please call 800-521-4323 or e-mail [email protected]. December 2008 Report on Patient Privacy they protected patients’ privacy and did not violate the privacy rule, he says. Lawrence Hughes, AHA regulatory counsel, says the organization has taken the same position as OCR. He also notes that privacy officers should be alert to new developments in patient safety and treatment and how they might impact privacy compliance. It would be a good idea to have “whoever is in charge of privacy involved in all kinds of activities like that,” Hughes says. Privacy officers should also have “training that is ongoing” and addresses new and emerging privacy issues, he adds. Learn more at http://www.ahaqualitycenter.org/ ahaqualitycenter/documentDetailServlet?contentId= 10343&contentTypeDesc=Review. Contact Hughes at [email protected], Weller at [email protected] and Burbank at [email protected]. G Boston Hospital Works With Victims After Medical Identity Theft Occurs When it comes to medical identity theft, one challenge covered entities (CEs) face is deciding whether or not to let the victim see his or her medical record and expunge any erroneous information. Officials at Massachusetts General Hospital in Boston has seen a recent wave of medical identity theft cases and decided to (1) notify the medical identity theft victims, and (2) help these victims clean up their records. To do this, the hospital set up a team composed of staff members representing different departments in the hospital, says Shanda Brown, assistant manager of health information services (HIS) at Mass General. The departments represented are police and security, registration, information systems and patient accounts, with the HIS department coordinating the response. continued CEs Dismiss Nosey Staff Members Three hospitals made headlines last month after they fired employees for accessing patient records when the employees were not directly involved in the patient’s care. u Shands-Jacksonville Medical Center in Florida fired 20 hospital workers who improperly accessed a professional football player’s records during his hospital stay, reports News4Jax.com. Jacksonville Jaguar Richard Collier was admitted in September with multiple gunshot wounds. After Collier was released from the hospital, Shands officials performed an audit on who accessed his medical records. Admissions personnel, nurses and patient relations staff were dismissed for accessing the records when they had no need to, News4Jax says. A spokesman for the union representing the employees says the punishment does not fit the offense and that some of the workers had legitimate reasons to access the information. “Any allegation of a breach in patient confidentiality is taken very seriously,” Shands told News4Jax in a prepared statement. “All allegations are investigated thoroughly. If it has been determined that a violation has occurred, disciplinary action up to and including termination can be used. In order to maintain patient confidentiality we do not comment on any specific cases,” it added. A Shands spokesperson did not return RPP’s calls seeking comment. u St. Vincent Infirmary Medical Center in Little Rock, Ark., fired six employees for improperly viewing a local news anchorwoman’s medical records, the Arkansas Democrat Gazette reported on Nov. 20. Anne Pressly was admitted to St. Vincent on Oct. 20 after being severely beaten in her own home by an intruder. She died a few days later. St. Vincent officials learned of a breach of her records via an audit in the days before her death, CEO Peter Banko told the newspaper. As many as eight people accessed the records and were put on leave pending investigation, Banko said. Officials determined that two of the staff members had valid reasons for viewing the records. Banko would not tell the newspaper what positions they held in the hospital, but said none of them were physicians. Visit www.nwanews.com. u University of Iowa (UI) Hospitals fired one employee and suspended seven others for improperly accessing patient information, the school said on Nov. 14. The breaches were discovered during a routine review of computer access to patient records, UI explains. The investigation is ongoing, a UI prepared statement says. “Everyone working or volunteering at UI Hospitals and Clinics is required to sign a statement attesting to their understanding of the policy and the privacy rule as part of their annual training,” the statement says. “Furthermore, everyone is frequently reminded that it is also inappropriate to discuss a patient’s status, care or other circumstances with those not involved in the patient’s direct care, or to discuss a patient in a public setting,” it adds. Visit www.uihealthcare.com. Visit www.AISHealth.com/conflist.html to review a free, regularly updated six-month calendar with dozens of Upcoming Health Business Meetings. Report on Patient Privacy There are two different ways the team finds out about medical identity theft: A person comes in claiming to have been a victim or, most often, a hospital staff member begins to suspect a patient isn’t who he says he is during the course of treatment. Either way, the team is there to support the victim, says Brown, who also spoke at a Medical Identity Theft Town Hall Meeting in Washington, D.C., in October (RPP 11/08, p. 4). With about 40 confirmed cases in 2008, Mass General has incorporated medical identity theft into its regular training regimen and has told its staff what it is, how it impacts the victim and the “thief,” who to contact and when to alert the team. For example, “we had a nurse remember treating a guy in the emergency department two weeks earlier under a different name,” she says. Once the team is alerted that medical identity theft is occurring, it will try to determine whether the patient is simply using a made-up name or has actually assumed the name of an existing patient. “The response and actions of the staff involved are largely dependent on the issue, so it’s difficult to specify what each member does, but generally the five departments will be involved in our cases,” Brown explains. “For example, depending on the situation, police and security [staff] may be called in to assist with ID verification. In other cases, this may be done by the registration staff.” The HIS or police and security team member will do a “false patient” interview, depending on how cooperative the patient is. Sometimes he or she will “fess up” right away because the ID they give doesn’t match what is in the system, or hospital employees explain to them how dangerous it is to have their records combined with someone else’s. “They get it,” Brown says. “We explain that they may have a different blood type or may be allergic to certain medications, and all that is important [because] we are going to treat them based on this record.” Some come to the realization on their own, like women who came in seeking prenatal care, but then see a different name listed on the chart as the baby’s mother. The “thieves” have a variety of reasons for using another ID, including immigration status, or the need to undergo confidential or sensitive tests such as HIV that they don’t want in their record. Oftentimes the patient is related to the victim. A new chapter on “EHRs/PHRs: Privacy and Security Considerations,” written by Chris Apgar, President of Apgar & Associates, Portland, Ore., is being added to the subscriber Web site this month. If you don’t have your password, call 800-521-4323 or e-mail [email protected] December 2008 If the patient is using the identity of a real person, Mass General’s privacy officer notifies the victim that his or her identification has been used. In the case of relatives using the information, the victim often knows about it and will not respond to the notification, Brown says. But those who do respond find a sympathetic team at Mass General, she says. “We let them know without giving them any details on the issue — that a patient presented with enough identifiers to indicate that they were the actual patient.” “We hold their hand through record check process. It’s stressful and we understand that. We’ll give them our contact information to be a resource if they have any questions.” The process is a bit like that for general identity theft, including a credit record check. The victim is also told that his or her medical record was cleaned and is given the opportunity to review it for erroneous information — “whatever they need to make sure that they are comfortable that their record is intact,” says Brown. Disputed Info Goes Into Separate Record “If a victim disputes the information, we remove it and put it in a separate record. A note is placed in the separate record with a brief report indicating where the information came from. We also maintain a database with a report of the incident as well as correction steps taken,” Brown explains. A provider does not need to be concerned about disclosing the medical information of an identity thief because his or her identifying information will likely not be given to the victim, says Marcy Wilder, former deputy general counsel for HHS. “Under HIPAA, individuals have a right to see their records, especially in the case where they have been a victim of medical identity theft. Victims need the ability to look at and correct their records,” she says. “The purpose of disclosing the information to the victim is so he or she can see and correct the record. Providers don’t need to identify the thief,” Wilder explains. Also, “you don’t have the right to privacy in someone else’s medical record, particularly if you have stolen their identity,” she contends. Mass General’s procedure on medical identity theft is a good one to emulate, says Wilder, who is now a partner in Hogan & Hartson’s Washington, D.C., office. Providers also should be implementing the Federal Trade Commission’s Red Flag Rules (RPP 10/08, p. 3). Even though the deadline for compliance with the rules has been pushed back, hospitals should be putting their programs in place now, she says. Contact Brown at [email protected] and Wilder at [email protected]. G Call 800-521-4323 or visit the MarketPlace at www.AISHealth.com for more information on AIS’s detailed A Guide to Auditing and Monitoring HIPAA Privacy Compliance. December 2008 Emergency Department Crowding, Fast Pace Create HIPAA Risks Fans of TV hospital dramas know the drill: Ambulance paramedics burst through the emergency department (ED) doors wheeling in a trauma victim. A team of harried physicians and other caregivers springs into action, soliciting details about the patient’s condition and yelling for procedures, “stat!” Meanwhile, a crowd of patients, visitors and bystanders take in every detail — including, sometimes, confidential patient information. While TV ratchets up the drama, even real-life EDs are known as high-pressure, high-stress environments where patient privacy may take a back seat to more pressing life-and-death matters. According to the American College of Emergency Physicians (ACEP), the responsibility for ensuring privacy and confidentiality “may be more challenging and more important in the emergency department than in many other clinical settings.” The primary privacy risk in an ED centers on the “incidental disclosure” of PHI, says Kathleen Ojala, associate director of compliance at Ohio State Medical Center. “That occurs because of the pace that most [emergency rooms] work at, and the proximity of individuals and the physical layout of most emergency departments,” she tells RPP. “It is very difficult to conduct exchanges of information with other individuals without the chance of somebody else overhearing that.” ACEP echoes this point, noting that an ED typically is a public, crowded environment in which many people are present. “Semi-open wards, congested hallways and a fishbowl atmosphere provide little or no physical privacy and limited opportunities to communicate personal information confidentially,” according to a January 2005 article in the ACEP journal, Annals of Emergency Medicine. Family Members Are Listening Compounding this problem is the fact that patients and family members in emergency departments are apprehensive about what’s going to be happening next, notes Ojala. “They are very clued into what the staff are doing and saying,” she explains. “They have ‘listening ears’ on, and they may really strain to overhear conversations about another individual, as well as their loved ones. Incidental disclosure is probably the greatest challenge to emergency rooms.” Incidental disclosure is not necessarily a violation of HIPAA, provided the covered entity has taken reasonable safeguards. Under the privacy rule, EDs must implement polices and procedures for ensuring that disclosure Report on Patient Privacy of PHI is limited to the “minimum necessary” to accomplish the purpose of the disclosure and nothing more. The HHS Office for Civil Rights (OCR) has posted numerous frequently asked questions (FAQs) on EDs and ambulances. “The HIPAA Privacy Rule permits an ambulance services or other health care provider to disclose [PHI] about an individual, without the individual’s authorization, to another health care provider, such as a hospital, for that provider’s treatment of the individual,” says the answer to one FAQ. “The Privacy Rule recognizes that oral communications often must occur freely and quickly in treatment settings. Thus, covered entities are free to engage in communications as required for quick, effective, and high quality health care,” says another FAQ that specifically mentions EDs as places where everyday precautions may not be practicable. Steps EDs Can Take to Ensure Privacy There are steps that hospitals can take to lower risks of patient privacy breaches, according to privacy experts. For instance, EDs should make sure that their “status board” — where patient information is recorded and updated — is not in plain view of passersby and other patients. This was one of the first things that Children’s Health System in Birmingham, Ala., considered following the release of final HIPAA regulations, according to Jennifer Denard Brown, R.N., the hospital’s emergency department information systems administrator. “We saw that we needed to get rid of our grease board,” she tells RPP. In its place, the hospital implemented an “electronic patient tracking board,” says Brown, who spearheaded this effort in 2002. The new system started off containing basic patient documentation and has since made the ED virtually paperless, she explains. With access to multiple computer terminals, the hospital’s ED staff can tell what’s going on throughout the entire department, Brown says. “That has improved the patient workflow, but has also made it where we’re not advertising who’s in our department. We made it more private.” The Alabama facility also took measures to address privacy concerns raised by crowding in the emergency room. Before HIPAA, the hospital’s triage area was open. “We had a ‘holding area,’ which was a large room with six patient beds behind curtains,” Brown explains. “We decided that patients needed to have their own rooms. We turned those curtain areas into actual rooms and also created private triage rooms, and increased the number of rooms we have in our department.” The hospital now is in the process of building a new expansion facility. When complete, the ED will have more waiting rooms and pa- Post your Health Business Job Openings at no charge at www.AISHealth.com/HealthJobsList.html. Report on Patient Privacy tient rooms, as well as more family conference rooms, she says, which will even better serve the patient population. While ED remodeling has become a national trend — and is improving patient privacy — there will still be situations in which ED staff are at risk of disclosing PHI, say other experts. Case in point: when a police officer accompanies a patient into the ED. This can create a compliance gray area, according to Kirsten Rabe Smolensky, associate professor of law at The University of Arizona, and an expert in patient privacy issues. “It may be unclear whether [the patient] is under arrest or not, and to what extent the police officer should be allowed to stay in the room,” she tells RPP. “If someone is a danger to the staff or physicians, it is perfectly reasonable to have the officer stay. But if it’s a situation where that’s not the case, you might ask them to step outside of the room.” Ojala also notes that ambulance paramedics may be curious about the outcome of a particular patient and will query the ED staff. This can present a privacy risk, she adds. “It is appropriate for the ambulance company to get information related to quality concerns, [such as] did they provide the appropriate treatment for the patient,” Ojala says. “But in terms of actual outcomes for the patient — did they survive or not — that would not be appropriate information to share with that ambulance,” she adds. Overcrowding, in which patients are waiting in close proximity, also presents privacy challenges. Ensuring patient privacy in such an instance may be as simple as remembering not to speak loudly, Smolensky says. “It’s a matter of using good judgment,” she adds. “If it makes sense to lower your voice when you’re talking to a patient in the hallway — and you can do that and still communicate with them — then lower your voice.” Feds Are Flexible Smolensky also notes that OCR, which oversees the privacy rule, appears to give EDs more flexibility in the way they handle privacy information, given the sometimes chaotic nature of the environment. OCR recognizes that you are “dealing with emergencies, and you can’t always get patient consent, because patients may come in and be unconscious,” she says as an example. This flexibility also applies to situations in which ED staff must talk with family members about the patient. “Personal representatives” are another topic covered by OCR in FAQs posted on the Web site. And in September, OCR issued guidance on how CEs may share information with persons involved in the patient’s care, such as family members, friends or other representatives (RPP 10/08, p. 1). OCR divided the guidance into two December 2008 documents: one for patients and one for providers. Each contained instructions on what to do in certain situations. For example, the guidance for providers asked: “If the patient is not present or is incapacitated, may a health care provider still share the patient’s health information with family, friends, or others involved in the patient’s care or payment for care?” The answer is yes. “[A] health care provider may share the patient’s information…as long as the health care provider determines, based on professional judgment, that it is in the best interest of the patient.” Ojala notes that HIPAA permits health care providers to disclose medical information to a family member, as long as the information is relevant to the patient’s current needs. “If I’m a health care provider and I have access to the patient’s entire medical record and maybe the patient had a miscarriage 10 years ago, when I’m dealing with their family member, the history of the miscarriage is not relevant today,” she says as an example. “So I’m not going to go ahead and disclose that to the family member. I need to focus my conversation on what’s relevant in today’s treatment.” Less experienced staff, however, can sometime get a little worried that are they disclosing too much information to the family, Ojala maintains. “As long as they remember that they are looking for what’s in the patient’s best interest…you’re going to be fine,” she says. “When the patient regains consciousness, he might be unhappy with you about an exchange that occurred, but it goes to the reasonableness that is required by HIPAA. If the staff can articulate a rational response, then that’s good. If the patient is still unhappy, we’ll work that through our usual patient compliant process.” Contact Ojala at [email protected], Smolensky at [email protected] and Brown at [email protected]. G Case Studies in Patient Privacy Problems and Their Solutions The following is another in an ongoing series of articles that is being written for RPP by health care privacy and security consultant Chris Apgar, CISSP, president of Apgar & Associates, LLC. Contact Apgar at (503) 977-9432 or capgar@apgarand assoc.com. First scenario: A small rural clinic experienced a robbery, and all of the servers used to store patient data were stolen. Fortunately for the small clinic, appropriate security had been implemented, and all of the data on the servers were encrypted. Though the patient data could not be retrieved by the thief, the clinic was located in a small town where, as soon as the robbery was reported to Call Bailey Sterrett at 800-521-4323 for rates on bulk subscriptions or site licenses, electronic delivery to multiple readers, and customized feeds of selective news and data…daily, weekly or whenever you need it. December 2008 Report on Patient Privacy the police, the police reported the incident to the local newspaper. This is an instance where the clinic took measures beyond what was required (but is now becoming appropriate practice) and encrypted the patient data “at rest,” or stored data. Even so, the clinic still stood to come under fire in the press since word travels quickly in a small town. From a regulatory perspective, the clinic was under no obligation to notify patients of the theft. On the other hand, once the word was out, patients would be concerned about their privacy, and it was likely that the clinic staff would be bombarded with questions related to the theft of the patients’ PHI. This is a situation where organizations need to look at the circumstances from a practical rather than a legal perspective. The solution was fairly simple. The clinic elected to send a letter to all patients to let them know that their data could not be read by the thief because it was encrypted. This saved staff members time responding to concerned patients and avoided a potential lawsuit that was unlikely to result in any damage awards, but would have cost the clinic to retain its own counsel to fight such a civil suit. Also, this action assisted in bolstering the clinic’s reputation. Patients were reassured and were less likely to seek treatment elsewhere because they could not trust the clinic to protect their medical records. Billing Staff Contacts Spouse Second scenario: The billing department of a clinic, in an attempt to collect a past due amount, contacted the husband of one of its patients and attempted to negotiate payment arrangements. The patient found out about the call to her husband and proceeded to file a formal complaint with OCR. She felt her privacy rights had been violated, especially given the past-due bill was incurred prior to her marriage to her current husband. She was right. A covered entity or business associate of a CE cannot contact a third party — in this case the spouse — about a patient’s account without specific authorization from the patient. Even though this could be considered part of payment activities where no authorization is required to use and disclose PHI, this holds true only for exchanges between CEs and/or their business associates. In this case, the solution would be to establish appropriate policies and procedures and train staff, requiring they contact only the patient when attempting to collect a past-due amount unless the patient has specifically authorized disclosure of payment records to a third party. Third scenario: A specialty clinic made the decision to market a workshop for patients that was directly related to increasing business in one of its specialty areas. The clinic developed a mailing list based on diagnosis code. Some of the marketing flyers were sent to deceased patients. Also, the focus of the workshop revealed to some degree the patient’s diagnosis, which was of a sensitive nature. It was not a workshop addressing specially PHI under state or federal law, but could prove to be embarrassing to the patient and the patient’s family (in the case of the flyers sent to the deceased patient). Marketing to Patients Is Prohibited In this case, two provisions of the HIPAA privacy rule were violated. HIPAA prohibits marketing to patients with very strict exceptions, and this did not fall into one of those exceptions. The clinic could have marketed to the patients only if the clinic obtained written authorization from the patient prior to sending any marketing material. The clinic could have done this during an appointment (“I’m interested in receiving additional information about my condition and I authorize [clinic] to send me condition related marketing material.”), remembering that many states require that an authorization expire, no matter the period of time noted on the authorization. Another option CEs can take advantage of is categorizing workshops as educational opportunities and sending out an announcement to all patients through a patient newsletter, on the CE’s Web site or potentially through direct mailing. Given this was a specialty clinic, direct mailing, even to all patients, may represent a violation of the privacy rule’s marketing provisions because such a mailing may reveal the patient’s condition. CEs cannot target individuals with a certain condition for marketing purposes unless the marketing is done during an appointment and is related to the patient’s treatment needs, or if what is being marketed is of nominal value. The second violation was not taking the time to eliminate any deceased patients from the list of recipients. The privacy rule provides equal protection for deceased patients as ones who are not deceased. The mailing was likely opened by a family member. Unless that family member fell in the class of individuals who could access the deceased patient’s PHI (such as a family member with a power of attorney to act on behalf of the deceased patient), his or her PHI was inappropriately disclosed. Even if the clinic had obtained authorization from the patient before sending any marketing material, the clinic has a responsibility to reasonably ensure that the PHI that can be derived from the marketing material does not wind up in the hands of someone not authorized to view the patient’s PHI. It pays to reasonably ensure that all deceased patients are deleted from a mailing list prior to sending out any patient-specific mailing. G Go to www.AISHealth.com to sign up for AIS’s Health Business Daily, a quick-and-easy daily news feed that is informative, provocative…and free. 10 Report on Patient Privacy HIN Offers Three Access Levels continued from p. 1 Currentcare, one of six regional HIEs that received five-year, $5 million grants from the federal Agency for Healthcare Research and Quality in September 2004, has unique features, including the three levels of privacy. For starters, while some HINs put everyone in the system automatically, Rhode Island’s is voluntary. Individuals are not enrolled unless they choose to take that step, making currentcare an opt-in, rather than an opt-out, system. The opt-in feature is a foundation of the HIN. “You need to have the choice” of whether to join, says RIQI President Laura Adams, reflecting the views of Rhode Island stakeholders. “You are out unless you consent to be in.” Participants who join have three options regarding access to their PHI: (1) They can give consent for information to be used only in an emergency; (2) they can list certain providers — by name — who are allowed access (they are also permitted to list providers — doctors, hospitals, etc. — who are not allowed access, with the understanding that all others are); and (3) they can permit full access to anyone who is involved in their care. The three levels of access were built in as a response to consumer feedback RIQI gathered during many months of public meetings. Consumers were asked “what it would take” to win their trust and participation in the system, Adams says. How Much Control? Adams believes the Rhode Island HIN provides greater and more sophisticated access controls than exist at other regional HIEs, but also thinks this will change — that more stringent controls and patient choice will become the norm. “There has been a rising awareness at the national level of the consumers’ right to control their information, an awakening about the whole issue,” she says. “If this [HIN] is really going to be consumer focused, then this is the direction that we need to take.” There has been a national debate over what kinds of controls participants in HIEs should have. The National Committee on Vital and Health Statistics (NCVHS) has advised HHS that patients should be able to “sequester” their information by some means, perhaps based on the age of the information, or the type, such as mental health or obstetrical-gynecological records. NCVHS said, in effect, that patients should have control over what goes into the HIE and who sees it. Currentcare does not go this far because providers were opposed to what they thought would be an incomplete record, Adams says. December 2008 “We had a series of discussions around this,” Adams says. “Many people felt like we already have a system today that is missing data. The community decided it would be all-in or all-out.” But she adds that currentcare has the technical capacity to limit information in this way if officials should ever decide to change the controls. The state took great pains to ensure that all stakeholders were involved and that privacy protections were paramount when it put the HIE together, she adds. The controls in place reflect “a good compromise,” Kinney agrees, and Quinlan echoes those thoughts. “We did research, we did focus groups, we had women’s groups, mental health groups, the American Civil Liberties Association…. The length of time that it took [to create currentcare] is a testament to how inclusive the process was,” Quinlan says. Phased Enrollment Under Way RIQI launched its enrollment and outreach effort two months ago. Adams describes the process thus far as “testing various strategies.” Efforts involve hospitals, hospital-based clinics and employers, all of which can enroll individuals in currentcare. “We plan to integrate this [enrollment process] into as many clinical settings as we can,” says Adams. She adds that focus groups said that “the place they would feel most comfortable signing up would be in the care setting. Our first step is to find out what is working and what is not,” Adams says. For example, the enrollment forms have been modified because they were initially confusing to potential participants. Care will be taken not to approach patients when they are in stressful situations, such as in an emergency room, to ensure they understand how the network works, including the three levels of privacy and access that they can select. The first phase of enrollment was to mail letters and enrollment forms to a portion of the state’s 200,000 Medicaid beneficiaries; 20,000 such letters were mailed in early fall, with about 800 people signing up. Of those, 80% gave their providers full access, Adams says. Enrollment is also taking place at one large outpatient clinic associated with a hospital. “A lot of people are enrolling their children,” Kinney says. The system affords a good way, for example, to keep up with immunizations and other ongoing health issues that may be common to children, he says. Rhode Island’s experience will give hospital privacy officers insight into what could be expected of them as state HIEs grow and what possible concerns they should be mindful of. Of course, they will not only be involved in enrollment, but also have to work with information Call 800-521-4323 to receive free copies of AIS’s Report on Medicare Compliance, Health Plan Week, Medicare Advantage News, Drug Benefit News, Inside Consumer-Directed Care and Medicare Part D Compliance News. December 2008 Report on Patient Privacy technology officials at the HIE to ensure privacy and security safeguards are in place. How enrollment will work at Rhode Island hospitals is still under discussion. Trying to enroll people when they are inpatients or seeking care in an emergency situation “is not fair to them,” Kinney says. “We have been talking about having enrollment days, where people would come in for enrollment. We are working with senior centers” to facilitate groups of people who could be enrolled at the same time, he says. The next step for the program is to target Warwick, the state’s second largest city, says Quinlan. Mailings are 11 being sent to the local government, hospitals and provider groups. Warwick was chosen because the outreach effort is “manageable,” Quinlan says. “We are a state of a million people. We are test-driving. We are learning as we go.” So far enrollment is done through a paper form, but RIQI hopes to have a form posted on its Web site that could be submitted electronically. Electronic enrollment could begin in spring 2009, Adams adds. Contact Adams at [email protected], Kinney at [email protected] and Quinlan at [email protected]. G PATIENT PRIVACY COURT CASES This monthly column is written by Rebecca Fayed of the Washington, D.C., office of Sonnenschein, Nath & Rosenthal LLP. It is designed to provide RPP readers with a sampling of the types of patient privacy cases that courts are now hearing. It is not intended to be a comprehensive monthly survey of all patient privacy court actions. Contact Fayed at rcfayed@ sonnenschein.com. u The Supreme Court of Georgia held that HIPAA preempts Georgia’s rules on ex parte communications with physicians. Following the death of her husband, Amanda Moreland brought a malpractice action against Dr. Michael Austin. Moreland produced her husband’s medical records, including documents pertaining to his treatment by several other physicians prior to his treatment by Austin. Thereafter, Austin’s attorney contacted each of the physicians and asked them to assess the patient’s “cardiovascular status and his prognosis.” Moreland objected to these “ex parte” contacts, asserting that they violated the HIPAA privacy rule. The Georgia Court of Appeals ruled that HIPAA did not preclude ex parte communications between defense counsel and a plaintiff’s prior treating physicians because “in the context of a judicial proceeding, the Georgia Civil Practice Act places more stringent requirements than HIPAA does on requests for documents from a third party health care provider.” Based on that, the court of appeals concluded that OCGA § 9-11-34 (c) was not preempted by HIPAA. Georgia’s high court disagreed, and reversed the state appeals court ruling. The court explained that the proper focus of the case is on the methods used to discover evidence of plaintiff’s medical condition, not on the discoverability of that evidence. After reviewing HIPAA, Georgia law and the case law of other jurisdictions, the court found that HIPAA preempts Georgia law with regard to ex parte communications between defense counsel and plaintiff’s prior treating physicians because HIPAA affords patients more control over the medical records when it comes to informal contacts between litigants and physicians. The court further noted that Georgia law “stands in sharp contrast” to HIPAA in that Georgia law facilitates and streamlines the litigation process by allowing defendants’ lawyers to informally contact physicians and orally communicate with them about the plaintiff’s medical condition once a patient files suit and puts his medical condition in issue. According to the court, HIPAA, on the other hand, prevents a medical provider from disseminating a patient’s medical information, whether orally or in writing, without obtaining a court order or the patient’s express consent. It follows, therefore, that HIPAA is more stringent and thus governs ex parte communications between defense counsel and health care providers. Importantly, the court notes neither its ruling nor the privacy rule prohibit informal discovery; rather, it imposes procedural prerequisites. Thus, “in order for defense counsel to informally interview plaintiff’s treating physicians, they must first obtain a valid authorization, or a protective order, or ensure that the patient has been given notice and an opportunity to object to the ex parte contact, all in compliance with the requirements of HIPAA as set forth in 45 C.F.R. § 164.512 (e).” (Moreland v. Austin) Visit the “Compliance” channel on www.AISHealth.com to access a wide range of free resources related to HIPAA. 12 Report on Patient Privacy December 2008 PRIVACY BRIEFS u The Children’s Hospital (TCH) in Denver has asked one of its contractors to notify about 1,600 families that one of the contractor’s employees fraudulently used one family’s credit card number, says Andrew Labbo, TCH’s privacy and data security officer. No TCH employees were involved, he says. The contractor terminated the employee after it completed a thorough investigation, Labbo tells RPP. The company, which handles collection of unpaid bills for TCH, now is notifying the families about the risk of identity theft. Contact Labbo through Elizabeth Whitehead at whitehead. [email protected]. u Lawanda Jackson pleaded guilty Dec. 1 to selling information from celebrities’ medical records in violation of HIPAA, The Associated Press reports. Jackson was an administrative specialist at the UCLA Medical Center. She was indicted in April by the U.S. Attorney’s Office for the Central District of California for allegedly accessing the PHI of celebrity patients and then disclosing it to the media for commercial advantage (RPP 6/08, p. 1). She faces 10 years in prison and a $250,000 fine. Her sentencing was scheduled for May, the AP says. Read more at www.usdoj.gov/usao/cac. u The Health Texas Provider Network, a subsidiary of Baylor Health Care System, notified about 100,000 patients that a laptop computer containing some of their personal information was stolen, the organization said Nov. 4. The laptop was used for administrative purposes and did not contain comprehensive patient records, the provider says. About 7,400 patients were notified that their Social Security numbers (SSNs) and “a limited amount of health information” such as a treatment code were on the computer. Other patients were told that it contained some health information, but no SSNs, Baylor says. Coincidentally, Baylor was in the process of upgrading its data security, which will allow the health system to track missing laptops and remotely erase data if necessary, it explains. The computer was stolen from an employee’s car. The employee was fired for breaking protocol by leaving the laptop in her car, though it was part of her job to visit Baylor locations and collect patient data on the computer, reports the Dallas Morning News. A Baylor spokesperson could not be reached for further comment. Visit www.bhcsnews. com/securityassistance. u The University of Florida’s (UF’s) College of Dentistry discovered during an upgrade that one of its servers may have been inappropriately accessed, endangering more than 300,000 patients’ information, the school said in October. The data included names, addresses, birth dates, SSNs and some dental procedure information for patients dating back to 1990. There was no credit card information in the database, or any evidence that the data were viewed or downloaded, a UF statement says. Visit www.dental.ufl.edu. u Requiring patient consent to use electronic medical records in biomedical research would further burden researchers and bias their work, says an online commentary from the journal Nature by Harvard Medical School lecturer Patrick Taylor. Legislators and patient advocates support patient consent for any uses of electronic medical records, especially with a national health information network in the works. “Although well intentioned, such arguments spell trouble,” the article says. “Linked data are crucial for research and improving health-care quality. People might fear that information will be revealed or misused, but the impulse to block all access in the absence of consent is mistaken.” Taylor points out that people can give their consent for an organization to use their information, but breaches happen to major retailers and government agencies all the time. Read more at www.nature.com. u The American Health Information Management Assn. is calling for more education for health care professionals and their employers regarding confidentiality and security of health records in response to recent high-profile breaches, a Nov. 6 prepared statement from AHIMA says. The AHIMA House of Delegates voted to (1) ask health care organizations to educate employees about the need for improved and consistent patient privacy and security, (2) bring health information management professionals to the forefront of educating about auditing and monitoring access to health information, and (3) endorse consistent health care policies and standards when a breach occurs. Visit www.ahima.org. u An article in the November/December issue of the Journal of AHIMA suggests eight tasks that CEs can use in their release of information (ROI) processes in the absence of uniform state privacy laws. To streamline the ROI process, AHIMA says, CEs should develop a comprehensive procedure that is documented, current and easily accessible; give staff access to appropriate state and federal laws; review employees to ensure that standards are being met; and record performance statistics, among other things. Visit www.ahima.org. Call Bailey Sterrett at 800-521-4323 for rates on bulk subscriptions or site licenses, electronic delivery to multiple readers, and customized feeds of selective news and data…daily, weekly or whenever you need it. If You Don’t Already Subscribe to the Newsletter, Here Are Three Easy Ways to Sign Up: ☎ (1) Call us at 800-521-4323 (2) Fax the order form on page 2 to 202-331-9542 (3) Visit the MarketPlace at www.AISHealth.com If You Are a Subscriber And Want to Routinely Forward this E-mail Edition to Others in Your Organization: Call Customer Service at 800-521-4323 to discuss AIS’s very reasonable rates for your on-site distribution of each issue. (Please don’t forward these e-mail editions without prior authorization from AIS, since strict copyright restrictions apply.)
© Copyright 2025 Paperzz