MHI 581: Chapter 6

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/39

flashcard set

Earn XP

Description and Tags

Chapter 6 Notes

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

40 Terms

1
New cards

List things that exists to foster trust?

laws

rules

regulations

contracts

2
New cards

contracts

establish expected behaviors in given situations and acts as a mechanism to enforce behaviors or apply penalties if a party does not behave as required by the contract

as parties behave according to the contract over time, more trust is established

3
New cards

laws/administrative rules/regulations

work in the same way as contracts; carry with it enforcement penalties to which regulated parties will be subject if they do not comply with the law

penalties create accountability for HIPAA-protected entities and as parties comply with the law or regulation over time more trust is established across society

4
New cards

How are the concepts of privacy, security, confidentiality, and risk established?

through contracts, laws, and regulations

they represent situations in which parties must develop a high degree of certainty around how other parties will act in order for an HIE initiative to be successful

5
New cards

What helps establish the trust necessary for successful HIE?

the combination of contracts, laws, and regulations that define expected behaviors around privacy, security, confidentiality, and risk

6
New cards

privacy

the freedom to choose what information is shared or not shared with other parties (i.e. an individual’s right to not disclose their genetic predisposition to cancer on an employment application)

7
New cards

confidentiality

the obligation to keep secret information with which one is trusted (i.e. the obligations imposed under HIPAA by prohibiting covered entity healthcare providers from disclosing protected health information to the media without a patient’s authorization)

often mislabeled as privacy obligations (i.e. the HIPAA Privacy Rule should be labeled as the Confidentiality Rule since it imposes obligations upon covered entities not to make certain disclosures of information

8
New cards

security

the combination of administrative, technical, and physical safeguards that ensure confidentiality and promote privacy

comprises the safeguards that prevent inappropriate uses and disclosures of information (i.e. strong passwords, encryption, and door locks)

9
New cards

accountability

refers to the norms, processes, and structures that make the population legally responsible for their actions and imposes penalties when laws are broken

a key privacy principle implemented throughout HIE to varying degrees and in different ways

10
New cards

privacy risk

the likelihood that individuals will experience problems as a result of data processing

can lead to breaches that impact individuals (i.e. authorized EHR user accessing PHI for someone who is not their patient)

can impact society as when when they are exposed they reduce trust

11
New cards

“rules of the road” for HIE

defined by a combination of laws and regulations at both state and federal levels as well as contracts among HIE participants

federal and state laws establish a baseline while HIE participants create additional rules through contracts among HIE participants (contracts cannot override or conflict with federal or state laws and regulations but they may detail obligations above and beyond federal or state laws and regulations)

12
New cards

“sensitive data”

mental and behavioral health data, communicable disease data, genetic information, and sexually transmitted disease data

state laws generally impose more stringent patient consent requirements on the disclosure of these types of data

HIPAA and federal law generally do not provide additional protections or consent requirements upon communicable or sexually transmitted diseases

13
New cards

What primary pieces of federal regulation govern privacy, security, and confidentiality in the healthcare space?

HIPAA & HITECH

created the federal floor of laws and regulations that impact use and disclosure of PHI across an HIE network

they establish how healthcare entities (e.g. HIE network participants) will act in given situations

14
New cards

covered entity

a healthcare provider that engages in certain electronic transactions (essentially any healthcare provider that accepts insurance of any kind will engage in covered electronic transactions)

a health plan

a healthcare clearing house (an entity that converts health information into standard formats required by HIPAA)

15
New cards

business associate

a person or entity (other than a member of a covered entity’s workforce) that creates, receives, maintains, or transmits PHI for or on behalf of a covered entity

HIOs and HIE networks are considered business associates under HITECH

16
New cards

PHI

individually identifiable health information transmitted or maintained in any form or medium

excludes certain education records ad student medical records

Privacy Rule lists 18 specific identifiers that results in PHI when paired with some type of health information

17
New cards

individually identifiable health information

health information including demographic information, created or received by a covered entity that relates to the past, present or future physical or mental health or condition of an individual or could reasonably be used to identify the individual

18
New cards

de-identified PHI & de-identified information

may be used by covered entities and their business associates with permission from their covered entity

can raise privacy concerns as individuals may feel that third parties should not profit from the use of their de-identified data

can be used by researchers looking to promote public health or analyze the efficacy of various treatments

19
New cards

Privacy Rule

establishes permissible uses and disclosures of PHI and

20
New cards

Security Rule

establishes the baseline security controls that are required or addressable by covered entities and business associates

establishes a number of general requirements that apply to all covered entities and business associates and then describes a number of implementation specifications that are either “required” or “addressable” by covered entities and business associates

21
New cards

Privacy Rule

covered entities and business associates may only use or disclose PHI if the Privacy Rule permits the particular use or disclosure or if the person who is the subject of the PHI authorizes the use or disclosure

designed to to allow sharing of health data among healthcare providers and health plans in the interest of patient treatment, improving quality, and population health management

22
New cards

“use” of PHI

the sharing, employment, application, utilization, examination, or analysis of such information within an entity that maintain such information

23
New cards

“disclosure” of PHI

the release, transfer, provision of, access to, or divulging in any other manner of information outside the entity holding the information

24
New cards

Under the Privacy Rule, what are the primary uses and disclosures of PHI that are permitted without a patient’s authorization?

to the individual to whom the PHI relates

for treatment, payment, or healthcare operations

for public health activities

as required by law

for certain research activities where a privacy board or an institutional review board has waived the authorization requirement

25
New cards

Provide an example of HIE use cases for treatment purposes

providing data at the point of care

delivering a clinical laboratory result

26
New cards

Provide an example of HIE use cases for public health purposes

delivering immunization reports to public health authorities

providing data for public health syndromic surveillance

27
New cards

Provide an example of HIE use cases for healthcare operations purposes

conducting quality assessment and improvement activities (outcome evaluations, development of clinical guidelines, etc)

population-based activities relating to improving health or reducing healthcare costs

related functions that do not include treatment

28
New cards

When is a covered entity obligated to grant a patient’s request that covered entities not make certain uses or disclosures of their information?

when the patient pays out-of-pocket in full for healthcare and requests that their healthcare provider not share information relating to such healthcare with the patient’s health plan

29
New cards

Privacy Framework

enhances customer trust by helping organizations to prioritize privacy and communicate existing privacy protections and outcomes to their clients

uses a set of core functions aimed to help an organization determine how they are considering privacy risks at every stage of development

30
New cards

HITECH Act

established a national requirement for individuals to be notified in the event of a breach of their PHI

generally increased the penalties for HIPAA violations

empowered State Attorneys General to bring HIPAA enforcement actions

calls for the sharing of HIPAA violation penalties with individuals harmed by violations

requires that HHS conduct HIPAA audits of covered entities and business associates

31
New cards

HITECH Breach Notification Rule

requires that a covered entity notify an individual of a breach of the individual’s “unsecured” PHI

covered entities must notify individuals and business associates must notify covered entities after performing a risk assessment

32
New cards

unsecured PHI

PHI that has not been encrypted or destroyed in accordance with guideline issued by the Secretary of HHS

illustrates the value and importance of encrypting PHI

33
New cards

Under the breach notification rule, what is presumed to be a breach?

an impermissible acquisition, access, use, or disclosure of unsecured PHI unless the covered entity or business associate demonstrates that there is a low probability that the PHI has been compromised based on a risk assessment

34
New cards

What factors may be used during a risk assessment to determine the probability of compromised PHI?

the nature and extent of the PHI involved including types of identifiers and the likelihood of reidentification

the unauthorized person who used the PHI or to whom the disclosure was made

whether the PHI was actually acquired or viewed

the extent to which the risk to the PHI has been mitigated

35
New cards

What must the notice to individuals (or from a business associate to a covered entity) include?

brief description of what happened (includes date of breach and the date of the discovery of the breach)

description of the types of unsecured PHI that were involved in the breach

any steps individuals should take to protect themselves from potential harm resulting from the breach

brief description of what covered entity involved is doing to investigate the breach, to mitigate harm to individuals, and to protect against any further breaches

contact procedures fro individuals to ask questions or learn additional information

media must be notified if breach affects more than 500 individuals and HHS must be notified of all breaches (immediately for breaches over 500 and annually for breaches less than 500)

36
New cards

Information Blocking Regulations (IBRs)

represent a substantial milestone toward healthcare information interoperability that are best understood in tandem with HIPAA and other federal privacy and security laws

implements a complementary framework that effectively requires actors to make EHI available for access, exchange, or use in response to a request for EHI (failing to respond to a request may result in regulatory enforcement unless the actor lacked the necessary intent or a regulatory exception applies to the request)

37
New cards

List the 8 distinct exceptions that function similar to regulatory safe harbors that IBR specifies

practices that are reasonable and necessary to prevent harm to a patient or another person

practices to protect the individual’s privacy

practices to protect the security of electronic health information

the request is infeasible to fulfill (e.g. uncontrollable events like natural disasters, or EHI cannot be unambiguously segmented)

practices reasonable and necessary to make health information temporarily unavailable (e.g. routine IT system maintenance)

actors may limit the content or manner in responding to a request

actors may charge fees, including a reasonable profit margin

actors may require certain conditions for the license or interoperable elements

38
New cards

List the 3 contracting structure categories used in an HIE

party-to-party/point-to-point agreements - direct agreement between individual parties exchanging data with each other; no HIE entity involved; e.g. jurisdiction by jurisdiction agreements with the CDC or biosurveillance

challenges: the number of point-to-point agreements will always be N - 1

two-party HIE participation agreements - individual agreement between HIE entity and a participant; HIE participants do not have direct contractual privity with each other; involvement of an HIE entity; e.g. “one-off”/individual agreements with different entities that participate in HIE network

challenges: the variation among agreements the HIO signs creates challenges for the HIO in administering data exchange

multiparty agreement - common set of terms and conditions to which an HIE entity and all participants agree; HIE network and all participants are in direct contractual privity with each other; involvement of an HIE entity; e.g. DURS governing eHealth or TEFCA

challenges: challenging to implement as all HIE network participants and the HIO must agree to the same terms

39
New cards

privity

contractual relationship

40
New cards

What role do state laws play in the area of sensitive data?

they can be enacted to add additional requirements on the use and disclosure of health information (in the area of patient consent)