UNDERSTANDING THE HIPAA/HITECH BREACH NOTIFICATION RULE 2/25/14

Size: px
Start display at page:

Download "UNDERSTANDING THE HIPAA/HITECH BREACH NOTIFICATION RULE 2/25/14"

Transcription

1 UNDERSTANDING THE HIPAA/HITECH BREACH NOTIFICATION RULE 2/25/14

2 RULES Issued August 19, 2009 Requires Covered Entities to notify individuals of a breach as well as HHS without reasonable delay or within 60 days. Further notification requirements of media and HHS if > 500 individuals. Requires Business Associates to notify Covered Entities of breach.

3 Why? Prior to the HITECH Act, this Rule did not exist. HITECH removed the harm threshold and replaced it with a more objective standard. The Rule strengthened the privacy and security protections for health information established under HIPAA.

4 What? Notification is required to affected individuals and to the Secretary of HHS following a discovery of a breach of unsecured protected health information (PHI). It establishes a uniform requirement to inform individuals and HHS when a breach of unsecured protected health information occurs.

5 What is a Breach? Generally, it is an impermissible use or disclosure that compromises the security or privacy of PHI. An impermissible use or disclosure of PHI is presumed to be a breach unless the Covered Entity or Business Associate demonstrates that there is a low probability that the PHI has been compromised based on a risk assessment.

6 Responsibilities of the Covered Entity and Business Associate Both must have: Documented policies and procedures regarding breach notification; A training and awareness program for the workforce staff; A security incident response, reporting and management system; A risk assessment system to determine probability of breach and breach notification; and A sanction policy for those who do not comply with the policies/procedures.

7 Breach Excludes The unintentional acquisition, access or use of PHI by a workforce member acting under the authority of the CE or BA, if the acquisition, access or use was made in good faith and within the scope of their authority and does not result in further use or disclosure in a manner permitted by the Privacy Rule. This does not include snooping employees as this would be intentional and not in good faith.

8 #2 Exception The inadvertent disclosure of PHI from a person authorized to access PHI at a CE or BA to another person authorized to access PHI at the CE or BA. In both cases, the information cannot be further used or disclosed in a manner not permitted by the Privacy Rule.

9 #3 Exception If the CE or BA has a good faith belief that the unauthorized individual, to whom the impermissible disclosure was made, would not have been able to retain the information.

10 Examples of Exceptions A fax with PHI is misdirected to the wrong physician, and upon receipt, the receiving physician calls to say it was received in error and has been destroyed. A risk assessment may be able to determine a low risk that the information was compromised and would not constitute a breach. A lab report was mistakenly sent to the patient s brother with the same last name as the patient. Determining if this is a reportable breach will depend upon the relationship of the brother and patient, and whether the patient s brother actually viewed any of the patient s PHI.

11 Examples - Continued A letter was sent to the wrong address. The letter was returned unopened, as undeliverable. It can be concluded that the improper address could not reasonably have retained the information. A nurse hands discharge papers to the wrong patient and immediately recognizes the error and retrieves them. This would not constitute a breach as the person could not have retained the information.

12 Remember, notification is required if the breach involved unsecured PHI. Definition: PHI that has not been rendered unusable, unreadable or indecipherable to unauthorized persons through the use of technology or methodology. Unsecured PHI Encryption and destruction are the technologies and methodologies that meet this definition.

13 Discovery of a Breach A breach of unsecured PHI shall be treated as discovered by a CE: On the first day the breach is known to the CE; At the time the workforce member or other agent has knowledge of the breach; By exercising reasonable diligence and would have been known to the CE; Reasonable diligence means the business care and prudence expected from a person seeking to satisfy a legal requirement under similar circumstances.

14 Breach Investigation The practice shall name an individual to act as the investigator (Privacy Officer, Security Officer, Risk Manager). The investigator shall be responsible for the management of the breach investigation, completion of a risk assessment, documentation and coordinating with others in the organization. The investigator shall be the key facilitator for all breach notification processes to the appropriate entities. (e.g., HHS, patient, media, law enforcement, etc.)

15 Risk Assessment To determine if there is a low probability that the PHI has been compromised, a risk assessment needs to be performed. The assessment is to be fact specific and must address four factors: The nature and extent of the PHI involved including the types of identifiers and the likelihood of re-identification; The unauthorized person who used the PHI or to whom the PHI was disclosed; Whether the PHI was actually acquired or viewed; and The extent to which the risk to the PHI has been mitigated.

16 Timeliness of Notification Covered Entities must notify individuals of a breach without unreasonable delay but in no case later than 60 calendar days from the discovery of the breach (not when the investigation is complete). This allows the CE to take a reasonable amount of time to investigate the circumstances around the breach in order to collect and develop the information required to be included in the notice to the individual.

17 Delay of Notification If a law enforcement official determines that a notification, notice or posting required under this section would impede a criminal investigation or cause damage to national security, such notification, notice or posting shall be delayed. The law enforcement official must provide a written statement citing the reason for the delay and specify the time for which a delay is required.

18 Content of Notice The notice must be written in plain language and must contain the following information, to the extent possible: A brief description of what happened, including the date of the breach and the date of discovery, if known; A description of the types of unsecured PHI that were involved in the breach (such as whether full name, social security number, date of birth, home address, account number, diagnosis, or other types of information were involved);

19 Content of Notice - Continued Any steps individuals should take to protect themselves from potential harm resulting from the breach; A brief description of what the CE involved is doing to investigate the breach, mitigate the harm to individuals, and to protect against any further breaches; and Contact procedures for individuals to ask questions or learn additional information which shall include a toll-free telephone number, an address, Web site or postal address.

20 Content of Notification - Continued The breach notice must be: Written in plain language and at an appropriate reading level using clear language without extra material that would diminish the message. Written in a language the individual who is not English proficient understands. E.g., Spanish Written in accordance with the Disabilities Act of 1990 to ensure effective communication with disable individuals in such formats as Braille, large print or audio.

21 Methods of Notification Mail: First class to individual s last known address. Minors/Incapacitated Individuals: Notice may be provided to parents or personal representative of the individual. Deceased Individual: If the CE knows individual is deceased, notification can be sent to next of kin or personal representative. If the CE had no contact information or has out-of-date contact information for the next of kin/personal representative, the CE is not required to provide substitute notice.

22 Substitute Forms of Notice These are substitute notices that are reasonably calculated to reach the individual: must have individual s consent to send. Telephone: if urgent notification is necessary due to potential for imminent misuse of unsecured PHI or individual refuses to accept written notice.

23 Notification Using Media If there is insufficient information for 10 or more individuals use as substitute form of notice. If breach has affected > 500 individuals: Notification within 60 calendar days to media. Notice must contain same information as individual notification. Must be in geographic area where affected individuals likely reside. This is in addition to, not a substitute for individual notice. Posting must be for 90 days.

24 brinstruction.html - HHS breach notification site. Immediate notification if breaches affect > 500 individuals. Immediate: same time as individual notification Notification to HHS < 500 individuals: No later than 60 days after the end of the calendar year in which the breaches were discovered, not the year in which the breaches occurred. E.g., 2013 unsecured PHI breaches would have to be reported by March 1, 2014.

25 Breach Log The practice shall maintain a process to record or log all breaches of unsecured PHI regardless of the number of patients affected. The following information should be logged: A description of what happened; date of breach; date of discovery, and # of individuals affected. A description of the type of PHI involved (such as name, SSN, DOB, address, etc.) A description of the action taken with regard to notification of patients.

26 Business Associate Responsibilities BA must notify the Covered Entity after the discovery of a breach. A breach is discovered on the day the BA, its employees, officer or agent knew or would have known of the breach by exercising reasonable diligence. Notice to CE must be provided without unreasonable delay and in no case later than 60 days after the breach notification obligations. Notification to CE automatically triggers CE s breach notification obligations. CE may delegate obligations to BA.

27 Burden of Proof After an impermissible use or disclosure of unsecured PHI, the CE and BA have the burden of demonstrating that all required notifications were made and that an impermissible use or disclosure did not constitute a breach. The CE has to show a low probability that the PHI was compromised with a risk assessment. The focus of the assessment is not on the patient s harm, but whether the information has been compromised. If it cannot be clearly determined there is a low probability, it has to be treated as a breach.

28 Civil Monetary Penalties Prior to 2/18/09 $100/violation with a maximum of $25,000 in a calendar year for the same violation. After 2/18/09 HITECH Act increased penalties up to $50,000/violation with a maximum of $1.5 million in a calendar year for the same violation.

29 Civil Monetary Penalties - Continued Now a 4 tiered liability structure: Tier 1: The offender did not know: $100 - $50,000/violation Tier 2: Violation due to reasonable cause, not willful neglect: $1,000 - $50,000/violation Tier 3: Violation was due to willful neglect and corrected: $10,000 - $50,000/violation Tier 4: Violation was due to willful neglect and NOT corrected: $50,000/violation

30 Factors in Determining Penalty The nature and extent of the violation, including the # of individuals affected. The nature and extent of the harms to the individual(s): physical, financial, reputation, ability to continue their healthcare. History of prior compliance and previous violations. The financial condition of the CE or BA.

31 Other Penalties State Attorney Generals may also pursue civil actions for a HIPAA breach. HIPAA establishes a criminal penalty of up to $50,000 and/or imprisonment for up to one year for any person who knowingly : Uses or causes to be used a unique health identifier; Obtains individually identifiable health information relating to an individual; or

32 Other Penalties - Continued Discloses individually identifiable health information to another person. If such offenses are committed under false pretenses, the penalty may be increased up to $100,000 and/or imprisonment up to 5 years. If the offense is committed with the intent of personal gain, the penalty is a fine up to $250,000 and/or imprisonment for up to 10 years. For criminal prosecution, the person charged had to have acted knowingly.

33 Further Information Arkansas Mutual Website HIPAA Survival Guide: Omnibus Rule: Breach Notification HHS website: Breach Notification Rule istrative/breachnotificationrule/

Investigating Privacy Breaches under HITECH and HIPAA

Investigating Privacy Breaches under HITECH and HIPAA Investigating Privacy Breaches under HITECH and HIPAA Barry Herrin Smith Moore Leatherwood LLP 1180 W. Peachtree St. NW, Suite 2300 Atlanta, Georgia 30309 T (404) 962-1027 F (404) 962-1200 Presented by:

More information

Breach Notification and Enforcement

Breach Notification and Enforcement Breach Notification and Enforcement Sponsored by Health Information and Technology Practice Group June 14, 2012 Presenter: Patricia A. Markus, Esquire, Smith Moore Leatherwood LLP, Raleigh, NC, Trish.Markus@smithmoorelaw.com

More information

Patient Privacy and Security: Data Breach Reporting and other HIPAA Changes

Patient Privacy and Security: Data Breach Reporting and other HIPAA Changes Patient Privacy and Security: Data Breach Reporting and other HIPAA Changes Paul T. Smith, Partner, Davis Wright Tremaine James B. Wieland, Shareholder, Ober Kaler 1 Developments The Health Information

More information

Health Information Technology for Economic and Clinical Health (HITECH) Act Privacy and Security Provisions

Health Information Technology for Economic and Clinical Health (HITECH) Act Privacy and Security Provisions Health Information Technology for Economic and Clinical Health (HITECH) Act Privacy and Security Provisions (Subtitle D of Title XIII of Division A of the American Recovery and Reinvestment Act (ARRA)

More information

AMERICAN RECOVERY & REINVESTMENT ACT OF 2009 TITLE XIII HEALTH INFORMATION TECHNOLOGY ANALYSIS OF PRIVACY AND SECURITY REQUIREMENTS (SUBPART D)

AMERICAN RECOVERY & REINVESTMENT ACT OF 2009 TITLE XIII HEALTH INFORMATION TECHNOLOGY ANALYSIS OF PRIVACY AND SECURITY REQUIREMENTS (SUBPART D) Introduction: AMERICAN RECOVERY & REINVESTMENT ACT OF 2009 TITLE XIII HEALTH INFORMATION TECHNOLOGY ANALYSIS OF PRIVACY AND SECURITY REQUIREMENTS (SUBPART D) The purpose of this document is to provide

More information

Model Business Associate Agreement

Model Business Associate Agreement Model Business Associate Agreement Instructions: The Texas Health Services Authority (THSA) has developed a model BAA for use between providers (Covered Entities) and HIEs (Business Associates). The model

More information

HIPAA BUSINESS ASSOCIATE AGREEMENT. ( BUSINESS ASSOCIATE ) and is effective as of ( Effective Date ). RECITALS

HIPAA BUSINESS ASSOCIATE AGREEMENT. ( BUSINESS ASSOCIATE ) and is effective as of ( Effective Date ). RECITALS HIPAA BUSINESS ASSOCIATE AGREEMENT This HIPAA Business Associate Agreement ( Agreement ) is entered into by and between the Trustees of the University of Pennsylvania as owner and operator of the University

More information

Government Investigations Into Cybersecurity Breaches In Healthcare

Government Investigations Into Cybersecurity Breaches In Healthcare 11 February 2016 Practice Groups: Cyber Law and Cybersecurity; Global Government Solutions; Government Enforcement; Health Care Government Investigations Into Cybersecurity Breaches In Healthcare By: Mark

More information

HITECH Omnibus Business Associate Agreement DU Hybrid CE ra FINAL

HITECH Omnibus Business Associate Agreement DU Hybrid CE ra FINAL BUSINESS ASSOCIATE AGREEMENT This Business Associate Agreement (the Agreement ) by and between Drexel University ( Hybrid Entity ), with a principal address at 3141 Chestnut Street, Philadelphia, PA 19104,

More information

Limited Data Set Data Use Agreement

Limited Data Set Data Use Agreement Limited Data Set Data Use Agreement This Agreement is made and entered into by and between (hereinafter Applicant ) and the State of Florida Agency for Health Care Administration, Florida Center for Health

More information

H I P AA B U S I N E S S AS S O C I ATE AGREEMENT

H I P AA B U S I N E S S AS S O C I ATE AGREEMENT H I P AA B U S I N E S S AS S O C I ATE AGREEMENT This HIPAA BUSINESS ASSOCIATE AGREEMENT (the BAA ) is entered into by and between Educators Mutual Insurance Association of Utah and its subsidiaries (

More information

Security Breach Notification Chart

Security Breach Notification Chart Security Breach Notification Chart Perkins Coie's Privacy & Security practice maintains this comprehensive chart of state laws regarding security breach notification. The chart is for informational purposes

More information

HIPAA Enforcement and Settlements. Alissa Smith, Partner Dorsey & Whitney LLP Des Moines, IA

HIPAA Enforcement and Settlements. Alissa Smith, Partner Dorsey & Whitney LLP Des Moines, IA HIPAA Enforcement and Settlements Alissa Smith, Partner Dorsey & Whitney LLP Des Moines, IA 1 Objectives Describe HIPAA s Enforcement Rule Review numerous government enforcement actions under HIPAA Review

More information

Security Breach Notification Chart

Security Breach Notification Chart Security Breach Notification Chart Perkins Coie's Privacy & Security practice maintains this comprehensive chart of state laws regarding security breach notification. The chart is for informational purposes

More information

Security Breach Notification Chart

Security Breach Notification Chart Security Breach Notification Chart Perkins Coie's Privacy & Security practice maintains this comprehensive chart of state laws regarding security breach notification. The chart is for informational purposes

More information

Security Breach Notification Chart

Security Breach Notification Chart Security Breach Notification Chart Perkins Coie's Privacy & Security practice maintains this comprehensive chart of state laws regarding security breach notification. The chart is for informational purposes

More information

Current Developments in Privacy and Security Rule Enforcement

Current Developments in Privacy and Security Rule Enforcement Current Developments in Privacy and Security Rule Enforcement Hamline University College of Law Health Law Institute National Speakers Series Jerome B. Meites, Esq. Chief Regional Civil Rights Counsel

More information

HIPAA DATA USE AGREEMENT

HIPAA DATA USE AGREEMENT HIPAA DATA USE AGREEMENT This Data Use Agreement (this "Agreement") is entered into effective as of 20 and until months thereafter the Effective Date by and among St. Jude Children s Research Hospital,

More information

AGREEMENT BETWEEN KIDS IN DISTRESS, INC., AND BROWARD COUNTY FOR SUBSTANCE ABUSE SERVICES Contract Number: KID-BARC-CFS-2017

AGREEMENT BETWEEN KIDS IN DISTRESS, INC., AND BROWARD COUNTY FOR SUBSTANCE ABUSE SERVICES Contract Number: KID-BARC-CFS-2017 Exhibit 2 AGREEMENT BETWEEN KIDS IN DISTRESS, INC., AND BROWARD COUNTY FOR SUBSTANCE ABUSE SERVICES Contract Number: KID-BARC-CFS-2017 This is an Agreement ("Agreement"), made and entered into by and between

More information

HIPAA Enforcement Rule. Aimee Wall Health Directors Legal Conference Institute of Government April 20, 2006

HIPAA Enforcement Rule. Aimee Wall Health Directors Legal Conference Institute of Government April 20, 2006 HIPAA Enforcement Rule Aimee Wall Health Directors Legal Conference Institute of Government April 20, 2006 Refresher Course Congress passed HIPAA in 1996 Various HIPAA rules adopted establishing national

More information

EXHIBIT G PRIVACY AND INFORMATION SECURITY PROVISIONS

EXHIBIT G PRIVACY AND INFORMATION SECURITY PROVISIONS Page 1 of 24 EXHIBIT G PRIVACY AND INFORMATION SECURITY PROVISIONS This Exhibit G is intended to protect the privacy and security of specified Department information that Contractor may access, receive,

More information

SCHWARTZ & BALLEN LLP 1990 M STREET, N.W. SUITE 500 WASHINGTON, DC

SCHWARTZ & BALLEN LLP 1990 M STREET, N.W. SUITE 500 WASHINGTON, DC 1990 M STREET, N.W. SUITE 500 WASHINGTON, DC 20036-3465 WWW.SCHWARTZANDBALLEN.COM TELEPHONE FACSIMILE (202) 776-0700 (202) 776-0720 To Our Clients and Friends Re: State Security Breach Laws M E M O R A

More information

rdd Doc 825 Filed 12/11/17 Entered 12/11/17 16:29:55 Main Document Pg 1 of 4

rdd Doc 825 Filed 12/11/17 Entered 12/11/17 16:29:55 Main Document Pg 1 of 4 17-22770-rdd Doc 825 Filed 12/11/17 Entered 12/11/17 16:29:55 Main Document Pg 1 of 4 UNITED STATES BANKRUPTCY COURT SOUTHERN DISTRICT OF NEW YORK ) In re: ) Chapter 11 ) 21st CENTURY ONCOLOGY HOLDINGS,

More information

HIPAA Crimes: How the New Crime Wave Affects You. May 17, 2016

HIPAA Crimes: How the New Crime Wave Affects You. May 17, 2016 HIPAA Crimes: How the New Crime Wave Affects You May 17, 2016 Michele L. Adelman, Partner, Foley Hoag LLP White Collar Crime & Government Investigations Practice Speakers Michele brings over a decade of

More information

Security Breach Notification Chart

Security Breach Notification Chart Security Breach Notification Chart Perkins Coie's Privacy & Security practice maintains this comprehensive chart of state laws regarding security breach notification. The chart is for informational purposes

More information

BUSINESS ASSOCIATE AGREEMENT

BUSINESS ASSOCIATE AGREEMENT BUSINESS ASSOCIATE AGREEMENT WHEREAS, the American Osteopathic Board of Orthopedic Surgery (AOBOS) provides certain board certification services to osteopathic physicians who complete appropriate postdoctoral

More information

UTAH IDENTITY THEFT RANKING BY STATE: Rank 31, 57.8 Complaints Per 100,000 Population, 1529 Complaints (2007) Updated December 30, 2008

UTAH IDENTITY THEFT RANKING BY STATE: Rank 31, 57.8 Complaints Per 100,000 Population, 1529 Complaints (2007) Updated December 30, 2008 UTAH IDENTITY THEFT RANKING BY STATE: Rank 31, 57.8 Complaints Per 100,000 Population, 1529 Complaints (2007) Updated December 30, 2008 Current Laws: A person is guilty of identity fraud when that person:

More information

STATE DATA SECURITY BREACH NOTIFICATION LAWS

STATE DATA SECURITY BREACH NOTIFICATION LAWS STATE DATA SECURITY BREACH NOTIFICATION LAWS Please note: This chart is for informational purposes only and does not constitute legal advice or opinions regarding any specific facts relating to specific

More information

Peg Schmidt, RHIA CHPS and Amy Derlink, RHIA, CHA April 10, 2015

Peg Schmidt, RHIA CHPS and Amy Derlink, RHIA, CHA April 10, 2015 Peg Schmidt, RHIA CHPS and Amy Derlink, RHIA, CHA April 10, 2015 1 Step One Gather the facts Who is the requestor? Why are they requesting (purpose)? What type of PHI are they asking for? (record type)

More information

State Data Breach Law Summary. November 2017

State Data Breach Law Summary. November 2017 November 2017 STATE DATA BREACH LAW SUMMARY To view the requirements for a specific state 1, click on the state name below. Alaska Idaho Minnesota Ohio Washington Arizona Illinois Mississippi Oklahoma

More information

THE GENERAL ASSEMBLY OF PENNSYLVANIA HOUSE BILL

THE GENERAL ASSEMBLY OF PENNSYLVANIA HOUSE BILL PRIOR PRINTER'S NO. PRINTER'S NO. THE GENERAL ASSEMBLY OF PENNSYLVANIA HOUSE BILL No. 1 Session of 01 INTRODUCED BY ELLIS, IRVIN, RABB, MILNE, PICKETT, BAKER, DAVIS, QUIGLEY, BOBACK, CHARLTON, O'NEILL,

More information

HIPAA Privacy Compliance Initiative: Final Rules Impact Employer Health Plans

HIPAA Privacy Compliance Initiative: Final Rules Impact Employer Health Plans HIPAA Privacy Compliance Initiative: Final Rules Impact Employer Health Plans www.morganlewis.com Presenters: Sage Fattahian Lauren Licastro Georgina O Hara Date: February 8, 2013 Time: 12:30-1:30 p.m.

More information

BUSINESS ASSOCIATE AGREEMENT

BUSINESS ASSOCIATE AGREEMENT BUSINESS ASSOCIATE AGREEMENT This BUSINESS ASSOCIATE AGREEMENT ( Agreement ) effective as of the laterdated signature hereto ( Effective Date ), identifies and clarifies the relationship and responsibilities

More information

Selected Federal Data Security Breach Legislation

Selected Federal Data Security Breach Legislation Selected Federal Data Security Breach Legislation name redacted Legislative Attorney April 9, 2012 CRS Report for Congress Prepared for Members and Committees of Congress Congressional Research Service

More information

HIPAA Privacy Rule Compliance Issues

HIPAA Privacy Rule Compliance Issues HIPAA Privacy Rule Compliance Issues Presentation for AAPM Myra N. Moran J.D. HHS/OCR August 2, 2006 DISCLAIMER My goal in speaking with you today is to explain Privacy Rule compliance issues. I can make

More information

BUSINESS ASSOCIATE AGREEMENT

BUSINESS ASSOCIATE AGREEMENT BUSINESS ASSOCIATE AGREEMENT THIS BUSINESS ASSOCIATE AGREEMENT (the Agreement ) is effective this day of, 2008 (the Effective Date ) by and between, (the Covered Entity ) and (the Business Associate ).

More information

STATE DATA SECURITY BREACH NOTIFICATION LAWS

STATE DATA SECURITY BREACH NOTIFICATION LAWS STATE DATA SECURITY BREACH NOTIFICATION LAWS Please note: This chart is for informational purposes only and does not constitute legal advice or opinions regarding any specific facts relating to specific

More information

BUSINESS ASSOCIATE AGREEMENT (BETWEEN GIOSTARCHICAGO.COM AND GIOSTARORTHOPEDICS.COM AND GODADDY)

BUSINESS ASSOCIATE AGREEMENT (BETWEEN GIOSTARCHICAGO.COM AND GIOSTARORTHOPEDICS.COM AND GODADDY) BUSINESS ASSOCIATE AGREEMENT (BETWEEN GIOSTARCHICAGO.COM AND GIOSTARORTHOPEDICS.COM AND GODADDY) This HIPAA Business Associate Agreement ( Agreement ) is entered into by and between GoDaddy.com, LLC, a

More information

COLORADO HB PROTECTIONS FOR CONSUMER DATA PRIVACY

COLORADO HB PROTECTIONS FOR CONSUMER DATA PRIVACY COLORADO HB 18-1128 PROTECTIONS FOR CONSUMER DATA PRIVACY 6-1-713, 713.5, 716, 24-73-101-103 Guy Mason (NOT AN ATTORNEY) Mile High ARMA June Meeting June 19, 2018 WHO? Prime Sponsors Rep. Coel Wist, Rep.

More information

STATE DATA SECURITY BREACH NOTIFICATION LAWS

STATE DATA SECURITY BREACH NOTIFICATION LAWS STATE DATA SECURITY BREACH NOTIFICATION LAWS Please note: This chart is for informational purposes only and does not constitute legal advice or opinions regarding any specific facts relating to specific

More information

Right to Request Access to Designated Record Set

Right to Request Access to Designated Record Set HIPAA Procedure 5002B Right to Request Access and Amendment to Designated Record Effective Date: April 14, 2003 Revised Date: November 2, 2016 Right to Request Access to Designated Record... 1 Denial of

More information

Enforcing HIPAA Administrative Simplification: Dispassionate Enforcement or Compassionate Prosecution?

Enforcing HIPAA Administrative Simplification: Dispassionate Enforcement or Compassionate Prosecution? Enforcing HIPAA Administrative Simplification: Dispassionate Enforcement or Compassionate Prosecution? By: Alan S. Goldberg, JD, LLM* Goulston & Storrs, Boston, MA, Washington, DC, and London, UK Past

More information

RESOLUTION AGREEMENT. I. Recitals

RESOLUTION AGREEMENT. I. Recitals RESOLUTION AGREEMENT I. Recitals 1. Parties. The Parties to this Resolution Agreement ( Agreement ) are the United States Department of Health and Human Services, Office for Civil Rights ( HHS ) and Affinity

More information

Sales Order (Processing Services)

Sales Order (Processing Services) SO# DIRECT CUST# INDIRECT CUST# Sales Order (Processing Services) Note: RelayHealth will assign CUST# s and SO# will be completed upon receipt. Sold To ( End User ): Bill To: Note: cannot be a P.O. Box

More information

ASSEMBLY, No STATE OF NEW JERSEY. 218th LEGISLATURE PRE-FILED FOR INTRODUCTION IN THE 2018 SESSION

ASSEMBLY, No STATE OF NEW JERSEY. 218th LEGISLATURE PRE-FILED FOR INTRODUCTION IN THE 2018 SESSION ASSEMBLY, No. 0 STATE OF NEW JERSEY th LEGISLATURE PRE-FILED FOR INTRODUCTION IN THE 0 SESSION Sponsored by: Assemblyman JAMES J. KENNEDY District (Middlesex, Somerset and Union) Assemblyman KEVIN J. ROONEY

More information

1 HB By Representative Williams (P) 4 RFD: Technology and Research. 5 First Read: 13-FEB-18. Page 0

1 HB By Representative Williams (P) 4 RFD: Technology and Research. 5 First Read: 13-FEB-18. Page 0 1 HB410 2 191614-1 3 By Representative Williams (P) 4 RFD: Technology and Research 5 First Read: 13-FEB-18 Page 0 1 191614-1:n:02/13/2018:CMH*/bm LSA2018-168 2 3 4 5 6 7 8 SYNOPSIS: This bill would create

More information

1 SB By Senators Orr and Holley. 4 RFD: Governmental Affairs. 5 First Read: 13-FEB-18. Page 0

1 SB By Senators Orr and Holley. 4 RFD: Governmental Affairs. 5 First Read: 13-FEB-18. Page 0 1 SB318 2 192523-5 3 By Senators Orr and Holley 4 RFD: Governmental Affairs 5 First Read: 13-FEB-18 Page 0 1 SB318 2 3 4 ENROLLED, An Act, 5 Relating to consumer protection; to require certain 6 entities

More information

Cops and Docs: Law Enforcement Access to Patients and Information

Cops and Docs: Law Enforcement Access to Patients and Information Cops and Docs: Law Enforcement Access to Patients and Information HIPAA Collaborative of Wisconsin October 19, 2012 Diane Welsh, von Briesen & Roper, s.c. dwelsh@vonbriesen.com or 608.661.3961 David Perlman,

More information

STATE DATA SECURITY BREACH LEGISLATION SURVEY

STATE DATA SECURITY BREACH LEGISLATION SURVEY STATE DATA SECURITY BREACH LEGISLATION SURVEY State and Timing/ Alaska H.B. 65 Signed into law June 13, 2008. Alaska Stat. Tit. 45, Ch. 48, 10 to 90 Alaska residents. Any person doing business, any person

More information

BUSINESS ASSOCIATE AGREEMENT WITH COVERED ENTITY

BUSINESS ASSOCIATE AGREEMENT WITH COVERED ENTITY BUSINESS ASSOCIATE AGREEMENT WITH COVERED ENTITY Date: 09/23/2013 Business Associate: Name: BeneFLEX HR Resources, Inc. Address: 10805 Sunset Office Drive, Ste 401 St. Louis, MO 63127 Covered Entity: This

More information

Site Access Agreement. (hereinafter referred to as the

Site Access Agreement. (hereinafter referred to as the Site Access Agreement Business Name: Site ) (hereinafter referred to as the Business Address: THIS AGREEMENT made effective as of this day of, 20 (hereinafter the Agreement ), between The Cooper Health

More information

Arent Fox LLP Survey of Data Breach Notification Statutes

Arent Fox LLP Survey of Data Breach Notification Statutes Arent Fox LLP Survey of Data Breach Notification Statutes James Westerlind August 2016 Survey Overview This Survey focuses on the data breach notification statutes of the states and territories within

More information

State Data Breach Notification Laws

State Data Breach Notification Laws State Data Breach Notification Laws This chart should be used for informational purposes only because the recommended actions an entity should take if it experiences a security event, incident, or breach

More information

1 SB By Senators Orr and Holley. 4 RFD: Governmental Affairs. 5 First Read: 13-FEB-18. Page 0

1 SB By Senators Orr and Holley. 4 RFD: Governmental Affairs. 5 First Read: 13-FEB-18. Page 0 1 SB318 2 192523-4 3 By Senators Orr and Holley 4 RFD: Governmental Affairs 5 First Read: 13-FEB-18 Page 0 1 SB318 2 3 4 ENGROSSED 5 6 7 A BILL 8 TO BE ENTITLED 9 AN ACT 10 11 Relating to consumer protection;

More information

Data Breach Charts. November 2017

Data Breach Charts. November 2017 Data Breach Charts November 2017 DATA BREACH CHARTS The following standard definitions of Personal Information and Breach of Security (based on the definition commonly used by most states) are used for

More information

KAISER FOUNDATION HOSPITALS ON BEHALF OF KAISER FOUNDATION HEALTH PLAN OF THE MID-ATLANTIC STATES, INC.

KAISER FOUNDATION HOSPITALS ON BEHALF OF KAISER FOUNDATION HEALTH PLAN OF THE MID-ATLANTIC STATES, INC. KAISER FOUNDATION HOSPITALS ON BEHALF OF KAISER FOUNDATION HEALTH PLAN OF THE MID-ATLANTIC STATES, INC. KP CONTRACTOR AFFILIATE WEB SITES LICENSE PROVIDER ENTITY AGREEMENT License Subject to the terms

More information

SERVICE PROVIDER SECURITY AGREEMENT. Clemson University ( Clemson ) and. Vendor Name Here. ( Service Provider )

SERVICE PROVIDER SECURITY AGREEMENT. Clemson University ( Clemson ) and. Vendor Name Here. ( Service Provider ) SERVICE PROVIDER SECURITY AGREEMENT Clemson University ( Clemson ) and Vendor Name Here. ( Service Provider ) This Service Provider Security Agreement (this Agreement ) effective as of (the Effective Date

More information

HIPAA Compliance During Litigation and Discovery

HIPAA Compliance During Litigation and Discovery Presenting a live 90-minute webinar with interactive Q&A HIPAA Compliance During Litigation and Discovery Safeguarding PHI and Avoiding Violations When Responding to Subpoenas and Discovery Requests THURSDAY,

More information

Agent/Agency Agreement

Agent/Agency Agreement Agent/Agency Agreement This Agent/Agency Agreement ( Agreement ) between CareConnect Insurance Company Inc. and ( CCIC ) and ( Agent ) sets forth the terms and conditions under which Agent may sell health

More information

State Data Breach Notification Laws

State Data Breach Notification Laws State Data Breach Notification Laws This chart should be used for informational purposes only because the recommended actions an entity should take if it experiences a security event, incident, or breach

More information

DATA USE AGREEMENT FOR ACCESS TO PROTECTED HEALTH INFORMATION

DATA USE AGREEMENT FOR ACCESS TO PROTECTED HEALTH INFORMATION DATA USE AGREEMENT FOR ACCESS TO PROTECTED HEALTH INFORMATION This Data Use Agreement (the Agreement ) is effective between the Greenville Hospital System and Data User(s) (the Data Users ): 1. (List name

More information

TRICARE Operations Manual M, April 1, 2015 Administration. Chapter 1 Section 5

TRICARE Operations Manual M, April 1, 2015 Administration. Chapter 1 Section 5 Administration Chapter 1 Section 5 Revision: 1.0 GENERAL 1.1 Contractors shall comply with all federal laws which apply to the administration of TRICARE health plans. In many situations where federal law

More information

DATA BREACH CLAIMS IN THE US: An Overview of First Party Breach Requirements

DATA BREACH CLAIMS IN THE US: An Overview of First Party Breach Requirements State Governing Statutes 1st Party Breach Notification Notes Alabama No Law Alaska 45-48-10 Notification must be made "in the most expeditious time possible and without unreasonable delay" unless it will

More information

NEW YORK IDENTITY THEFT RANKING BY STATE: Rank 6, Complaints Per 100,000 Population, Complaints (2007) Updated January 25, 2009

NEW YORK IDENTITY THEFT RANKING BY STATE: Rank 6, Complaints Per 100,000 Population, Complaints (2007) Updated January 25, 2009 NEW YORK IDENTITY THEFT RANKING BY STATE: Rank 6, 100.1 Complaints Per 100,000 Population, 19319 Complaints (2007) Updated January 25, 2009 Current Laws: A person is guilty of identity theft when he knowingly

More information

Cumulative Identity Theft Statutes Updated as of July 26, 2011

Cumulative Identity Theft Statutes Updated as of July 26, 2011 State Bill Number Summary Adopted AL SB 68 Classifies all instances of identity theft as Class C felonies and extends the statute of limitations to seven years. AZ SB 1045 Adds to the list of offenses

More information

Take me back to the Home Page. NotaryClasses.com Sample Notary Exam 1 FINES and PENALTIES

Take me back to the Home Page. NotaryClasses.com Sample Notary Exam 1 FINES and PENALTIES Take me back to the Home Page NotaryClasses.com Sample Notary Exam 1 FINES and PENALTIES PLEASE READ THIS SECTION BEFORE BEGINNING THE SAMPLE EXAM Our program is designed to help you pass the notary exam

More information

State Data Breach Notification Laws

State Data Breach Notification Laws State Data Breach Notification Laws Please note that state data breach notification laws change frequently. The recommended actions an entity should take if it experiences a security event, incident or

More information

Freedom of Information Act (FOIA) Procedures and Guidelines

Freedom of Information Act (FOIA) Procedures and Guidelines Freedom of Information Act (FOIA) Procedures and Guidelines 1 Purpose Shelby Charter Township is committed to open government and access to public records. This policy describes the Township s procedures

More information

KANSAS IDENTITY THEFT RANKING BY STATE: Rank 29, 61.0 Complaints Per 100,000 Population, 1694 Complaints (2007) Updated December 15, 2008

KANSAS IDENTITY THEFT RANKING BY STATE: Rank 29, 61.0 Complaints Per 100,000 Population, 1694 Complaints (2007) Updated December 15, 2008 KANSAS IDENTITY THEFT RANKING BY STATE: Rank 29, 61.0 Complaints Per 100,000 Population, 1694 Complaints (2007) Updated December 15, 2008 Current Laws: In Kansas, identity theft is defined as knowingly

More information

Legal and Ethical Considerations (Chapter 3- Mosby s Dental Hygiene)

Legal and Ethical Considerations (Chapter 3- Mosby s Dental Hygiene) Legal and Ethical Considerations (Chapter 3- Mosby s Dental Hygiene) Brief Overview of the Legal System A brief review of the fundamentals of how the legal system in the United States operates is important

More information

HIPAA -- Compliance and Enforcement Issues

HIPAA -- Compliance and Enforcement Issues HIPAA -- Compliance and Enforcement Issues John T. Bentivoglio Arnold & Porter john_bentivoglio bentivoglio@aporter.com 202.942.5508 Overview HHS approach toward compliance Compliance procedures Civil

More information

Chapter PERSONAL INFORMATION PROTECTION ACT. Article 01. BREACH OF SECURITY INVOLVING PERSONAL INFORMATION

Chapter PERSONAL INFORMATION PROTECTION ACT. Article 01. BREACH OF SECURITY INVOLVING PERSONAL INFORMATION Alaska Statute Chapter 45.48. PERSONAL INFORMATION PROTECTION ACT Article 01. BREACH OF SECURITY INVOLVING PERSONAL INFORMATION Sec. 45.48.010. Disclosure of breach of security. (a) If a covered person

More information

DATA PROTECTION LAWS OF THE WORLD. South Korea

DATA PROTECTION LAWS OF THE WORLD. South Korea DATA PROTECTION LAWS OF THE WORLD South Korea Downloaded: 31 August 2018 SOUTH KOREA Last modified 26 January 2017 LAW In the past, South Korea did not have a comprehensive law governing data privacy.

More information

(No. 97) (Approved June 19, 2008) AN ACT

(No. 97) (Approved June 19, 2008) AN ACT (H. B. 2130) (No. 97) (Approved June 19, 2008) AN ACT To add a new subsection (d) to Section 2, to amend the first paragraph of Section 3, and to amend the first paragraph of Section 4 of Act No. 111 of

More information

PODIATRY RESIDENCY RESOURCE, INC. END USER SOFTWARE LICENSE AGREEMENT. IMPORTANT-READ CAREFULLY BEFORE USING THE Podiatry Residency Resource SOFTWARE.

PODIATRY RESIDENCY RESOURCE, INC. END USER SOFTWARE LICENSE AGREEMENT. IMPORTANT-READ CAREFULLY BEFORE USING THE Podiatry Residency Resource SOFTWARE. PODIATRY RESIDENCY RESOURCE, INC. END USER SOFTWARE LICENSE AGREEMENT IMPORTANT-READ CAREFULLY BEFORE USING THE Podiatry Residency Resource SOFTWARE. THIS LICENSE AGREEMENT (THE "AGREEMENT") CONSTITUTES

More information

Interstate Commission for Adult Offender Supervision

Interstate Commission for Adult Offender Supervision Interstate Commission for Adult Offender Supervision Privacy Policy Interstate Compact Offender Tracking System Version 3.0 Approved 04/23/2009 Revised on 4/18/2017 1.0 Statement of Purpose The goal of

More information

Coordinated text from 10 August 2011 Version applicable from 1 September 2011

Coordinated text from 10 August 2011 Version applicable from 1 September 2011 Coordinated text of the Act of 30 May 2005 - laying down specific provisions for the protection of persons with regard to the processing of personal data in the electronic communications sector and - amending

More information

State Data Breach Laws

State Data Breach Laws State Data Breach Laws 1 Alaska Personal information means a combination of (A) an individual s name;... and (B) one or more of the following information elements: (i) the individual s social security

More information

The following provides a brief summary of the salient provisions relating to forensic DNA:

The following provides a brief summary of the salient provisions relating to forensic DNA: ASLME Reports: A Summary of the Justice for All Act Alice A. Noble, J.D., M.P.H. Grant No. 1 RO1-HG002836-01 The Justice for All Act (H.R. 5107 ), a law that has significant implications for both the expansion

More information

Commonwealth of Massachusetts County of Suffolk The Superior Court NOTICE OF DOCKET ENTRY

Commonwealth of Massachusetts County of Suffolk The Superior Court NOTICE OF DOCKET ENTRY Commonwealth of Massachusetts County of Suffolk The Superior Court CIVIL DOCKET#: SUCV2012-01925-B RE: Massachusetts v South Shore Hospital Inc TO: Shannon C Choy-Seymour, Esquire Mass Atty General's Office

More information

- 79th Session (2017) Assembly Bill No. 474 Committee on Health and Human Services

- 79th Session (2017) Assembly Bill No. 474 Committee on Health and Human Services Assembly Bill No. 474 Committee on Health and Human Services CHAPTER... AN ACT relating to drugs; requiring certain persons to make a report of a drug overdose or suspected drug overdose; revising provisions

More information

WASHINGTON COUNTY GUIDELINES AND PROCEDURES FOR MINNESOTA GOVERNMENT DATA PRACTICES ACT

WASHINGTON COUNTY GUIDELINES AND PROCEDURES FOR MINNESOTA GOVERNMENT DATA PRACTICES ACT General Administration Policy #1300 - Manual WASHINGTON COUNTY GUIDELINES AND PROCEDURES FOR MINNESOTA GOVERNMENT DATA PRACTICES ACT Manual #1300 Adopted by the Washington County Board of Commissioners

More information

OKLAHOMA IDENTITY THEFT RANKING BY STATE: Rank 25, 63.9 Complaints Per 100,000 Population, 2312 Complaints (2007) Updated January 10, 2009

OKLAHOMA IDENTITY THEFT RANKING BY STATE: Rank 25, 63.9 Complaints Per 100,000 Population, 2312 Complaints (2007) Updated January 10, 2009 OKLAHOMA IDENTITY THEFT RANKING BY STATE: Rank 25, 63.9 Complaints Per 100,000 Population, 2312 Complaints (2007) Updated January 10, 2009 Current Laws: It is unlawful for any person to willfully and with

More information

CODE OF ETHICS FOR THE POLICE SERVICE OF NORTHERN IRELAND

CODE OF ETHICS FOR THE POLICE SERVICE OF NORTHERN IRELAND CODE OF ETHICS FOR THE POLICE SERVICE OF NORTHERN IRELAND CODE OF ETHICS FOR THE POLICE SERVICE OF NORTHERN IRELAND This Code will be made available free on request in accessible formats such as in Braille,

More information

West Virginia University Research Integrity Procedure Approved by the Faculty Senate May 9, 2011

West Virginia University Research Integrity Procedure Approved by the Faculty Senate May 9, 2011 West Virginia University Research Integrity Procedure Approved by the Faculty Senate May 9, 2011 1 I. Introduction 2 3 A. General Policy 4 5 Integrity is an obligation of all who engage in the acquisition,

More information

NAID Complaint Resolution Council Guidelines

NAID Complaint Resolution Council Guidelines I. Preamble. Whether as a NAID member, a customer of a NAID member or a member of the general public, we all have an interest in the ethical behavior of NAID members, as well as prospective members. The

More information

TEXAS ETHICS COMMISSION

TEXAS ETHICS COMMISSION TEXAS ETHICS COMMISSION CHAPTER 159, LOCAL GOVERNMENT CODE FINANCIAL DISCLOSURE BY COUNTY OFFICERS AND EMPLOYEES Effective September 28, 2011 (Revised 09/20/2011) Texas Ethics Commission, P.O. Box 12070,

More information

A Compliance Guide for Covered Entities and Business Associates

A Compliance Guide for Covered Entities and Business Associates A Compliance Guide for Covered Entities and Business Associates Kate Borten, CISSP, CISM A Compliance Guide for Covered Entities and Business Associates Kate Borten, CISSP, CISM : A Compliance Guide for

More information

Provider Electronic Trading Partner Agreement

Provider Electronic Trading Partner Agreement This Electronic Trading Partner Agreement ( Agreement ) is entered into as of the Day day of, 20 ( Effective Date ), by and between Blue Cross Month Year and Blue Shield of South Carolina and its subsidiaries,

More information

ADDENDUM TO STANDARD CONTRACT BETWEEN Community Coordinated Care for Children, Inc. (4C) AND (CONTRACTOR)

ADDENDUM TO STANDARD CONTRACT BETWEEN Community Coordinated Care for Children, Inc. (4C) AND (CONTRACTOR) ADDENDUM TO STANDARD CONTRACT BETWEEN Community Coordinated Care for Children, Inc. (4C) AND (CONTRACTOR) This Contract Addendum, entered into between, hereinafter referred to as the Contractor to provide

More information

BUSINESS ASSOCIATE AGREEMENT

BUSINESS ASSOCIATE AGREEMENT BUSINESS ASSOCIATE AGREEMENT This Business Associate Agreement ( Agreement ) is entered into by and between eclinicalworks, LLC, a Massachusetts limited liability company ( eclinicalworks ), and ( Customer

More information

The Lawyer s Ethical and Legal Duties to protect Private Information

The Lawyer s Ethical and Legal Duties to protect Private Information The Lawyer s Ethical and Legal Duties to protect Private Information Claude E. Ducloux Attorney At Law Board Certified Texas Board of Legal Specialization Civil Trial Law Civil Appellate Law Director of

More information

POLICY STATEMENT. Topic: False Claims Act Date Effective: 10/13/08. X Revised New Section: Corporate Compliance Number: 10.05

POLICY STATEMENT. Topic: False Claims Act Date Effective: 10/13/08. X Revised New Section: Corporate Compliance Number: 10.05 The Arc of Ulster-Greene 471 Albany Avenue Kingston, NY 12401 845-331-4300 Fax: 331-4931 www.thearcug.org POLICY STATEMENT Topic: False Claims Act Date Effective: 10/13/08 X Revised New Section: Corporate

More information

Patient Any person who consults or is seen by a physician to receive medical care

Patient Any person who consults or is seen by a physician to receive medical care POLICY & PROCEDURE TITLE: SUBPOENA of Medical Records Scope/Purpose: To ensure proper disclosure and release of Protected Health Information (PHI) Division/Department:All Health Point Clinics Policy/Procedure

More information

Intersections Data Breach. July

Intersections Data Breach. July Intersections Data Breach Consumer Notification Guide July 2010 www.intersections.com 888.283.1725 DataBreachServices@Intersections.com Table of contents Section I Introduction.......... 4 Section II

More information

COMMONWEALTH OF MASSACHUSETTS. ) COMMONWEALTH OF MASSACHUSETTS, ) ) Plaintiff, ) ) v. ) ) SOUTH SHORE HOSPITAL, INC., ) ) Defendant.

COMMONWEALTH OF MASSACHUSETTS. ) COMMONWEALTH OF MASSACHUSETTS, ) ) Plaintiff, ) ) v. ) ) SOUTH SHORE HOSPITAL, INC., ) ) Defendant. COMMONWEALTH OF MASSACHUSETTS SUFFOLK, ss. SUPERIOR COURT CIVIL ACTION NO. ) COMMONWEALTH OF MASSACHUSETTS, ) ) Plaintiff, ) ) v. ) ) SOUTH SHORE HOSPITAL, INC., ) ) Defendant. ) ) FINAL JUDGMENT BY CONSENT

More information

2013 New Law Workbook

2013 New Law Workbook 2013 New Law Workbook A SUMMARY OF LEGISLATION AFFECTING COUNTY CLERKS California Association of Clerks and Election Officials 2013 New Law Workbook Presented by California Association of Clerks and Election

More information

Privacy Policy. Cabcharge will only collect personal information which is necessary for the operation of its business.

Privacy Policy. Cabcharge will only collect personal information which is necessary for the operation of its business. Privacy Policy Cabcharge Australia Limited ( Cabcharge ) is subject to the Australian Privacy Principles pursuant to the Privacy Act 1988 as amended by the Privacy Amendment (Enhancing Privacy Protection)

More information

INVESTIGATIONS AND CASE MANAGEMENT Administrative General Order 3.0

INVESTIGATIONS AND CASE MANAGEMENT Administrative General Order 3.0 INVESTIGATIONS AND CASE MANAGEMENT Administrative General Order 3.0 The purpose of this Order is to set forth Citizens Police Review Board (CPRB) policy regarding investigations and case management of

More information

Internet/Telephone Voting Procedures

Internet/Telephone Voting Procedures Township of Georgian Bluffs Municipal Election 2018 1. Definitions Internet/Telephone Voting Procedures Act means the Municipal Elections Act 1996, SO 1996 c.32 as amended. Ballot means either an image

More information