Markle Connecting for Health thanks Linda Malek, JD, Partner, Moses & Singer, for drafting this paper.
We also thank members of the Markle Connecting for Health Health Information Exchange Advisory Committee for their contributions to developing this paper.
|
The document you are reading is part of the Markle Connecting for Health Common Framework for Private and Secure Health Information Exchange (Markle Common Framework). The Markle Common Framework includes a set of foundational policy and technology guides published in 2006. In April 2012, a set of Policies in Practice was published to further specify these foundational documents and address a range of critical health information sharing implementation needs identified by experts working in the field. |
Executive Summary
I. Overview
II. Definition of Electronic Health Record
III. HIPAA Expanded to Apply Directly to Business Associates
IV. Enforcement and Penalties
V. Breach Notification
VI. Written Contract Extending Covered Entity’s Obligations
VII. Marketing
VIII. Sale of Protected Health Information
IX. Limited Data Sets and the Minimum Necessary Standard
X. Fundraising
XI. Patient’s Right to Request Nondisclosure
XII. Patient Access to Protected Health Information
XIII. Expanded Accounting of Disclosures of Protected
Health Information Maintained in Electronic Format
XIV. Effective Dates
XV. Regulatory Guidance
The Health Information Technology for Economic and Clinical Health (HITECH) Act paves the way for an unprecedented level of federal leadership and public investment to support health information sharing efforts.1 It also makes substantial change to the privacy and security provisions of the Health Insurance Portability and Accountability Act of 1996 (HIPAA). These important changes to the HIPAA Privacy Rule (45 CFR 164, Subparts A and E) and the Security Rule (45 CFR Part 164, Subparts A and C) directly affect health information sharing efforts and their responsibilities and practices for maintaining privacy of health information. Some of these changes include:
This Policies in Practice supplements the 2006 Markle Connecting for Health Common Framework for Private and Secure Health Information Exchange (Markle Common Framework) by updating relevant information on HIPAA privacy and security laws addressed throughout the Markle Common Framework. It summarizes a survey of important federal, legal and regulatory changes, since release of the Markle Common Framework through January 2012, that affect the exchange of individually identifiable health care information. Issues addressed in the Policies in Practice include:
The resource does not address state laws or other types of federal laws or regulations (such as those pertaining specifically to the meaningful use of electronic health records) that may have an impact on the operations of a health information sharing effort. In addition, the resource is not intended to be used as legal advice or legal interpretation and the reader should be mindful of developments in the law when drafting and negotiating policies and contracts. It will be updated and revised from time to time to include further changes in relevant laws and regulations.
Health information sharing implementers should be mindful of state and federal laws and regulations when applying the Markle Common Framework. Implementers are encouraged to periodically refer back to this Policies in Practice for updates on new laws and regulations that are pertinent to the exchange of individually identifiable health care information.
Since the policies of the Markle Common Framework were released in 2006, many of the relevant privacy laws and regulations have been modified. This document is meant to assist the reader of those policies by updating the relevant information contained in policies 1 through 8 of the Policy Guides: How Information is Protected (the “Policies”), with respect to the federal privacy and security requirements. Upon its initial publication this document reflects the changes in the relevant laws and regulations since the release of the Policies through January 2012, but it will be subject to change as final laws and regulations are promulgated, and will therefore be updated and revised from time to time to include any further changes in relevant laws and regulations. It is intended to be a survey of the major federal privacy laws to date that affect the exchange of individually identifiable healthcare information, and is not intended to be used as legal advice or legal interpretation. A discussion of state law or other types of federal laws or regulations (such as those pertaining specifically to the meaningful use of electronic health records, for example) that may have an impact on the operations of an information exchange are outside the scope of this document. Because the relevant privacy laws and regulations are continually evolving, it is important that the reader be mindful of developments in the law when drafting and negotiating policies and contracts.
Enacted as part of the American Recovery and Reinvestment Act of 2009 (“ARRA”), the Health Information Technology for Economic and Clinical Health Act 2 (the “HITECH Act”) has made substantial changes to the privacy and security provisions of the Health Insurance Portability and Accountability Act of 1996 (“HIPAA”) including the Privacy Rule (45 CFR Part 164, Subparts A and E) and the Security Rule (45 CFR Part 164, Subparts A and C).3 The summary below describes many of these important changes and is linked with the relevant portions of the Policies to assist the reader in updating his or her efforts to maintain privacy in a health information-sharing environment. It should be noted that while many states have laws that specifically address the collection, use, disclosure, storage and protection of health information maintained in a record, whether or not held in electronic format, neither the Policies nor this document address the application of such state laws, which are beyond the scope of the Policies and this document. The reader should endeavor to understand and implement such relevant state laws.
Some of the important changes made by the HITECH Act include making business associates subject to many obligations that previously only applied to covered entities, as that term is defined in HIPAA (“Covered Entity” or “Covered Entities”); refining the “minimum necessary” standard; increasing restrictions on the use of protected health information, as that term is defined in HIPAA (“Protected Health Information”) for marketing purposes; mandating breach notification by Covered Entities as well as by business associates; and enhancing penalties for non-compliance with HIPAA.
Prior to the HITECH Act there was no federal definition of an “electronic health record.” Pursuant to the HITECH Act, “electronic health record” means an electronic record of health-related information on an individual that is created, gathered, managed, and consulted by authorized health care clinicians and staff.4 This is a very broad definition and is meant to cast a wide net applying the modified privacy and security requirements to health information that is maintained in electronic health records.
Prior to the HITECH Act, the security and privacy provisions of HIPAA only extended to business associates by virtue of their business associate agreements with Covered Entities. The HITECH Act now applies many of the privacy and security regulations directly to business associates.5
Under the HITECH Act, with respect to protecting Protected Health Information, both Covered Entities as well as business associates must comply with the administrative safeguards (45 C.F.R. § 164.308), physical safeguards (45 C.F.R. § 164.310), technical safeguards (45 C.F.R. § 164.312) and the policies and procedures and documentation requirements (45 C.F.R. § 164.316) of the Security Rule.6
The HITECH Act provides that if a business associate violates a provision of its business associate contract or any other requirement of the Privacy Rule, enforcement actions may be taken directly against the business associate.7 Such enforcement actions are discussed further in Section IV below. Prior to the HITECH Act there was no direct enforcement action available to governmental agencies if a business associate breached its obligations regarding the privacy of Protected Health Information. Moreover, it should be noted that, as stated above, Section 13401(a) of the HITECH Act also specifically states that 45 CFR § 164.308 (Administrative Safeguards), 164.310 (Physical Safeguards), 164.312 (Technical Safeguards) and 164.316 (Policy and Procedures and documentation requirements) apply directly to a business associate of a Covered Entity in the same manner that such sections apply to the Covered Entity.
The HITECH Act applies the civil and criminal penalties of the HIPAA Security Rule directly to business associates.8 Prior to the HITECH Act, business associates were not directly liable for such penalties. Rather, they were bound only by the contractual obligations they owed to the Covered Entities with whom they contracted.
The HITECH Act requires that if a business associate knows of a pattern of activity or practice of a Covered Entity that constitutes a material breach or violation of the Covered Entity’s obligation under the business associate agreement, then the business associate is responsible to take certain actions with respect to the non-compliant Covered Entity (e.g., cure the breach, terminate the arrangement, or report to the Secretary if termination is not feasible).9
Entities that provide data transmission of Protected Health Information to a Covered Entity and require access on a routine basis to Protected Health Information, such as a Health Information Exchange Organization, a Regional Health Information Exchange, an E- prescribing Gateway, or a vendor that contracts with a Covered Entity to act on its behalf by offering a personal health record to patients as part of such Covered Entity’s electronic health record, are now explicitly treated as business associates of such Covered Entity for purposes of HIPAA.10
The HITECH Act updated the HIPAA enforcement rule by increasing civil monetary penalties which correlate fines to the level of the violator’s intent in a tiered structure, and extended such penalties to business associates. In addition to the penalties listed in the first tier, which had previously been the statutory civil monetary penalty limit, the HITECH Act added the second and third tiers of penalties:
Each State Attorney General may bring a civil action on behalf of a resident of his or her state to enforce HIPAA. State Attorneys General may impose civil penalties equal to that of the “first tier” penalties as described in Section IV.A. above.14
The HITECH Act specifically extended criminal penalties for the wrongful disclosure of individually identifiable health information under Section 1177 of the Social Security Act (42 U.S.C. Section 1320d-6) to business associates.15 Moreover, HITECH expanded criminal liability in general. Prior to HITECH, only covered entities and certain individuals working for them could be liable directly under 42 U.S.C. Section 1320d-6.16 Instead, individuals that were not connected with a covered entity would be prosecuted under the principles of aiding and abetting the criminal behavior.
HITECH expanded the reach of the statute by stating that any individual (whether or not connected with a covered entity) and any employee can be prosecuted directly for the violation of Section 1320d-6.17
The HITECH Act and the regulations promulgated pursuant to that Act created a mandatory national scheme for breach notification.
1. Definition
In general, the term “breach” is defined as: The acquisition, access, use or disclosure of Protected Health Information (for purposes of this Update Document only, “Unauthorized Access”) that compromises the security or privacy of Protected Health Information.18 “Compromises the security or privacy of Protected Health Information” is further defined to mean an Unauthorized Access that “poses a significant risk of financial, reputational, or other harm to the individual.”19 Therefore, the risk of harm must be evaluated to determine whether a “breach” has in fact occurred. This risk of harm threshold requires that a Covered Entity and business associate consider the potential harm of an Unauthorized Access of unsecured information in determining whether notification of such unauthorized access must be made.
2. Exceptions
Importantly, not all Unauthorized Access to Protected Health Information rises to the level of a “breach” as defined under the provisions of the HITECH Act. The exceptions set forth in the HITECH Act and applicable regulations include: (i) the unintentional acquisition, access, or use of Protected Health Information by a workforce member or person acting under the authority of a Covered Entity or business associate made in good faith and within the scope of authority of the Covered Entity or business associate (i.e., the workforce member or person acting on behalf of the Covered Entity or business associate),20 provided that it does not result in further unauthorized use or disclosure;21 (ii) an inadvertent disclosure of Protected Health Information from an authorized individual at a Covered Entity or business associate to another authorized individual at the same Covered Entity or business associate, or organized health care arrangement in which the Covered Entity participates, provided that it does not result in further unauthorized acquisition, access, use or disclosure;22 and (iii) a disclosure of Protected Health Information where a Covered Entity or business associate has a good faith belief that an unauthorized person to whom the disclosure was made would not reasonably have been able to retain such information.23
To determine whether such a risk of harm exists, Covered Entities and business associates are required to carry out risk assessments upon discovering an Unauthorized Access of Protected Health Information. If the Unauthorized Access of Protected Health Information meets the “risk of harm” threshold then the affected individuals must be given notice “without unreasonable delay” but not later than 60 days after discovery.24 Notice to affected individuals must contain a brief description of the occurrence of the breach and the types of information that were involved in the breach, steps that individuals should take to protect themselves, how the Covered Entity is mitigating harm and contact information for individuals to ask questions and learn additional information about the breach.25 If over 500 persons are affected in a given state, media in that state must also be notified.26 Regulations also specify the elements that must be in the notification to the media.27 Notice must be provided to the Secretary of the U.S. Department of Health and Human Services (the “Secretary”) “immediately” if the breach involves 500 or more individuals. If the breach is with respect to less than 500 individuals, the Covered Entity may maintain a log of any such breach occurring, and annually submit such a log to the Secretary documenting the breaches that occurred during the relevant year.28
Pursuant to the regulations promulgated under the HITECH Act for breach notification for unsecured Protected Health Information, 45 C.F.R. Parts 160 and 164,29 the administrative requirements that Covered Entities must fulfill under the Privacy Rule have been expanded to apply in the context of the new breach notification provisions.30
1. Mandatory Training: Each Covered Entity is required to train all members of its workforce on policies and procedures with respect to the new breach notification provisions.31
2. Mandatory Training on Material Changes: In addition to requiring training for all current and new employees, the regulations specifically require training to be provided to each member of the Covered Entity’s workforce whose functions are affected by a material change in the policies or procedures caused by the new breach notification provisions, within a reasonable period of time after the material change becomes effective.32
3. Sanctions Against Workforce Members: A Covered Entity must have and apply appropriate sanctions against members of its workforce who fail to comply with the privacy policies and procedures of the Covered Entity with regard to the new breach notification provisions.33
4. Implementation of Policies and Procedures: Covered Entities are now required to implement policies and procedures with respect to the new breach notification rules.34
5. Required Changes to Policies or Procedures: Covered Entities are required to change their policies and procedures as necessary and appropriate in light of the new breach notification rules.35
6. Process for Complaints: The Covered Entity is required to provide a process for individuals to make complaints concerning the Covered Entity’s policies and procedures with respect to the new breach notification provisions.36
7. Protection for Individuals Who Complain: A Covered Entity cannot intimidate, threaten, coerce, discriminate against, or take any retaliatory action against any individual for the exerciseof any rights established under the new breach notification requirements.37
8. Prohibition of Waiver: Covered Entities are prohibited from requiring individuals to waive their rights under the new breach notification provisions as a condition of the provision of treatment, payment, enrollment in a health plan, or eligibility for health benefits.38
Under HIPAA, a Covered Entity is permitted to use or disclose Protected Health Information incident to a use or disclosure otherwise permitted or required by the Privacy Rule,39 so long as the Covered Entity has complied with the requirements of the minimum necessary standard40 and has implemented the requisite administrative, technical, and physical safeguards.41 Therefore, if, for example, an improper match is returned to a requester using the Record Locator Service, then such use or disclosure is arguably incident to a use or disclosure otherwise permitted or required by the Privacy Rule. The preamble to the breach notification rule under the HITECH Act further clarifies the concept of an incidental use or disclosure being a permitted use or disclosure under the Privacy Rule:
“In contrast, a use or disclosure of protected health information that is incident to an otherwise permissible use or disclosure and occurs despite reasonable safeguards and proper minimum necessary procedures would not be a violation of the Privacy Rule pursuant to 45 CFR 164.502(a)(1)(iii) [the incidental disclosure provision] and, therefore, would not qualify as a potential breach.” 42
Therefore, if an improper match is returned from the Record Locator Service and such use or disclosure is deemed to be an incidental use or disclosure that qualifies under 45 CFR 164.502(a) (1)(iii) then it would not be a breach under the new breach notification regulations.
If, however, a requestor obtains Protected Health Information about an individual in a way that does not qualify as an incidental use or disclosure under 45 CFR 164.502(a)(1)(iii) then the Covered Entity must conduct a risk assessment (as discussed in Section V.C. above) to determine whether a breach has occurred. Moreover, based on the particular facts and circumstances, the Covered Entity should also analyze whether one of the exceptions to unauthorized access of Protected Health Information applies (as discussed in Section V.B.2).
The HITECH Act requires a Covered Entity to have a written contract with all organizations that provide data transmission of Protected Health Information to the Covered Entity and require access on a routine basis to Protected Health Information, such as a Health Information Exchange Organization, a Regional Health Information Exchange, an E-prescribing Gateway, or a vendor that contracts with a Covered Entity to act on its behalf by offering a personal health record to patients as part of such Covered Entity’s electronic health record.43 Each such entity must enter into a written contract to document assurances that Protected Health Information will be properly safeguarded, as well as to apply the required administrative safeguards.44
Under the HITECH Act, Protected Health Information generally cannot be used for marketing purposes unless certain specific exceptions apply:
In general, the HITECH Act clarifies that a communication (paid or unpaid) made by a Covered Entity or business associate that is about a product or service and that encourages recipients of that communication to purchase or use the product or service is not considered a healthcare operation but rather considered to be marketing, unless such communication is made (i) to describe a health-related product or service (or payment for such product or service) that is provided by, or included in a plan of benefits of, the Covered Entity making the communication; (ii) for treatment of the individual; or (iii) for case management, for care coordination for the individual or to direct or recommend alternative treatments, therapies, healthcare providers, or settings of care to the individual.45
Even if one of the exceptions (i – iii) listed above were to apply, where the Covered Entity or business associate receives or has received direct or indirect payment in exchange for making a communication, such communication is still considered marketing unless one of the following exceptions apply: (1) the communication describes a drug or biologic that is currently being prescribed for the recipient of the communication and the payment is reasonable, (2) the communication is made by the Covered Entity and the Covered Entity obtains a valid authorization from the recipient with respect to the communication, or (3) the communication is made by a business associate on behalf of the Covered Entity and the communication is consistent with the written contract between such business associate to the Covered Entity.46
Generally, the sale of Protected Health Information is prohibited under the HITECH Act unless a Covered Entity obtains a valid authorization from the individual that includes a specification of whether Protected Health Information can be further exchanged for remuneration by the entity receiving the Protected Health Information.47
Under the HITECH Act, to comply with the HIPAA Privacy Rule’s “minimum necessary” requirement, Covered Entities must “to the extent practicable” limit the use, disclosure or request of Protected Health Information to a limited data set. If needed, however, the Covered Entity can, rather than utilizing a limited data set, limit the use, disclosure or request of Protected Health Information to the minimum that they deem necessary to accomplish the intended purpose.49 Prior to the HITECH Act, Covered Entities were required to use, disclose and request the minimum necessary Protected Health Information to accomplish the intended purpose, but there were no further defining criteria for compliance with this requirement.
Under the original HIPAA Privacy Rule, use of limited data sets was not linked to compliance with the minimum necessary standard. Rather, limited data sets were previously used only for public health, research or healthcare operations. Now, under the HITECH Act, a Covered Entity must limit, to the extent practicable, the use, disclosure or request of Protected Health Information to a limited data set. Covered Entities may now have to make use of limited data sets more frequently when disclosing health records. A limited data set consists of Protected Health Information from which an extensive list of personal identifiers is removed.50
Any written fundraising communication that is a “health care operation” must provide an opportunity for the recipient of such communication to elect not to receive any further fundraising communication.51
An individual has the right to request that a Covered Entity restrict the disclosure of the Protected Health Information of such individual.52 Pursuant to the HITECH Act, a Covered Entity must honor such request if the disclosure is to a health plan for purposes of carrying out payment or health care operations and where the Protected Health Information pertains solely to a health care item or service for which the healthcare provider has been paid out-of-pocket in full.53 Prior to this change, individuals were permitted to request a restriction on a Covered Entity’s use and disclosure of Protected Health Information, but the Covered Entity was permitted discretion regarding whether to comply with such restriction.
Covered Entities maintaining electronic health records are required to give individuals copies of the records in electronic form. HIPAA required Covered Entities to provide individuals with a copy of their Protected Health Information in the form or format requested, if readily producible, and if not readily producible in such form or format, in readable hard copy form.54 The HITECH Act clarifies this obligation by requiring that a Covered Entity that utilizes or maintains an electronic health record must provide copies of Protected Health Information in electronic format to an individual (or to such individual’s designees) who requests his or her information in such format.55
A Covered Entity can typically charge a “reasonable, cost-based fee” that includes copy costs, postage, and the cost of preparing an explanation/summary of the Protected Health Information provided in response to an individual’s request. However, the HITECH Act limits the fee associated with the Covered Entity’s provision of a copy of electronic health records. The Covered Entity may impose a fee for providing electronic information (or summary or explanation of such information) to the requesting individual, but such fee may not be greater than “the entity’s labor cost in responding to the request for the copy (or summary or explanation).”56
For Covered Entities that use or maintain electronic health records, the HITECH Act eliminates the Privacy Rule exception to exclude from their accounting to individuals disclosures of Protected Health Information related to treatment, payment and health care operations. Upon the effective dates set forth in the HITECH Act, Covered Entities must provide an accounting of all disclosures of Protected Health Information, including for treatment, payment and health care operations (“TPO”), if the disclosure was made “through an electronic health record” during the previous three years.57 The effective date for Covered Entities that implemented an electronic health record system after January 1, 2009, was January 1, 2011 (or the actual date the electronic health record system was implemented), although the effective date may be extended at the Secretary’s discretion to 2013.58 The HITECH Act requires the Secretary to promulgate regulations clarifying the types of information required to be collected about such disclosures.59 Until this guidance is issued, and the Secretary indicates whether the effective date of this provision has been extended, Covered Entities whose electronic health record systems were implemented after January 1, 2009, should provide an accounting of disclosures of Protected Health Information for TPO purposes made through an electronic health record.
Covered Entities can now either directly account for disclosures made by business associates or provide a list of business associates to be contacted for an accounting, thus shifting the burden to the business associate to report disclosures of Protected Health Information directly to the individual if such individual requests the accounting from the business associate.60
A. Except as otherwise stated below, the HITECH Act provisions became effective twelve months after enactment, on February 17, 2010.61
B. Depending on when a Covered Entity acquires an electronic health record, the effective date of the new accounting regulations varies. For electronic health records acquired as of January 1, 2009, the new accounting rules apply to disclosures of Protected Health Information made from that electronic health record on and after January 1, 2014. For electronic health records acquired after January 1, 2009, the accounting rules apply to disclosures made on and after the later of January 1, 2011, or the actual date the Covered Entity acquires an electronic health record. The compliance dates may be postponed for up to two years if it is deemed necessary by the Secretary of the U.S. Department of Health and Human Services.62
C. The restrictions on marketing communications went into effect and apply to written communications occurring on or after February 17, 2010.63
D. The new fundraising rule went into effect and applies to written communications occurring on or after February 17, 2010.64
E. The provision requiring the Secretary to formally investigate complaints of willful neglect went into effect as of February 17, 2011.65
F. The tiered increase in amount of civil monetary penalties applies to violations occurring after February 17, 2009.66
G. The provisions regarding enforcement by state attorneys general apply to violations occurring after February 17, 2009.67
H. The effective date of the Interim Final Rule; Breach Notification for Unsecured Protected Health Information, 45 C.F.R. pts 160 and 164, was September 23, 2009, which was 30 days after the publication of the interim rule as required by the HITECH Act.68 The enforcement date of the Interim Final Rule is February 22, 2010.69
On July 14, 2010, HHS issued a notice of proposed rulemaking to modify the HIPAA privacy, security, and enforcement rules to comply with the changes required by the Health Information Technology for Economic and Clinical Health Act.70 These proposed rules may be used as an indication of what the final, modified regulations could require. Those proposed regulation may be found at http://www.gpo.gov/fdsys/pkg/FR-2010-07-14/pdf/2010-16718.pdf (accessed on January 27, 2012). Moreover, various governmental agencies issue guidance related to various aspects of collection, use, disclosure and/or maintenance of identifiable information, including health information. This guidance is not statutory law enacted by a legislature nor does it constitute regulations resulting from the process of a regulatory comment period, rather the guidance of a governmental agency allows the reader to understand how the agency, tasked with the interpretation of the relevant statutes and regulations, would apply the law in certain circumstances. Such guidance may also outline a best practices approach to the application of such statutes and regulations, under the purview of the governmental agency issuing the guidance.
Relevant guidance that has been issued by government agencies since the release of the Policies includes the following:
1. Protecting Consumer Information
In December 2010, the FTC issued a document entitled “Protecting Consumer Privacy in an Era of Rapid Change-A Proposed Framework for Businesses and Policymakers.” This guidance applies to all commercial entities that collect or use consumer data that can be reasonably linked to a specific consumer, computer, or device. It contains several recommended principles by which such entities should protect consumer privacy. That guidance can be accessed at http://www.ftc.gov/os/2010/12/101201privacyreport.pdf (accessed on January 27, 2012). As a follow-up to its guidance regarding protection of consumer privacy, the FTC testified before Congress on July 14, 2011, outlining its enforcement, education and policy initiatives to protect consumers’ privacy. The prepared statements of the FTC to the Congressional subcommittees can be found at http://www.ftc.gov/os/testimony/110714internetprivacytestimony.pdf (accessed on January 27, 2012).
2. FTC Health Breach Notification
The FTC also enforces the FTC Health Breach Notification Rule that applies to all businesses that offer or maintain personal health records. The rule implements a requirement that such entities notify individuals in the event of a security breach with respect to their health records. The FTC Health Breach Notification Rule does not apply to a HIPAA-covered entity, as such covered entity would have to report a breach under the breach notification rule promulgated by HHS. Moreover, the FTC Health Breach Notification Rule does not apply to any other entity to the extent it engages in activities as a business associate of a HIPAA-covered entity.71 The FTC has issued guidance for such businesses at http://business.ftc.gov/privacy-and-security/health-privacy (accessed on January 27, 2012).
1. Risk Analysis
In July 2010, OCR issued a publication entitled “Guidance on Risk Analysis Requirements under the HIPAA Security Rule.” Such guidance is meant to assist organizations in identifying and implementing the most effective and appropriate administrative, physical, and technical safeguards to secure electronic protected health information by analysis of the risk and vulnerability of electronic protected health information. The guidance can be accessed at http://www.hhs.gov/ocr/privacy/hipaa/administrative/securityrule/rafinalguidancepdf.pdf (accessed on January 27, 2012).
2. Security Rule Guidance
Also available through OCR is a seven-part series of CMS guidance regarding the application of the Security Rule to HIPAA covered entities, “Security Rule Educational Paper Series.” The series was revised after the publication of the Policies. That series may be accessed at http://www.hhs.gov/ocr/privacy/hipaa/administrative/securityrule/securityruleguidance.html (accessed on January 27, 2012).
The ONC is the principal Federal entity charged with coordination of nationwide efforts to implement and use health information technology and electronic exchange of health information. The position of National Coordinator was created in 2004, through an Executive Order, and legislatively mandated in the Health Information Technology for Economic and Clinical Health Act (HITECH Act) of 2009.
The Health IT Policy Committee is a federal advisory committee that provides recommendations on health IT policy issues to the National Coordinator for consideration. The reader may wish to keep abreast of the various recommendations made by the Health IT Policy Committee to the National Coordinator, as such recommendations may then be incorporated into official guidance of HHS or even be the basis for new regulations in the area of health IT. The recommendations of the Health IT Policy Committee may be found at http://healthit.hhs.gov/portal/server.pt/community/healthit_hhs_govpolicy_recommendations/1815 (accessed on January 27, 2012).
__________
This document is intended only to provide a general sense of recent changes to relevant laws, and is provided for informational and educational purposes only. The Markle Foundation is not authorized to practice law, and use of and access to this document do not create an attorney-client relationship between Markle and the user. Persons intending to use the information contained in this document with respect to any particular issue or problem should consult with their legal counselors before doing so.
©2012, Markle Foundation
This work was originally published as part of the Markle Connecting for Health Common Framework Policies in Practice for Health Information Sharing and is made available subject to the terms of a License. You may make copies of this work; however, by copying or exercising any other rights to the work, you accept and agree to be bound by the terms of the License. All copies of this work must reproduce this copyright information and notice.