HIPAA included Administrative Simplification provisions that required the U.S. Department of Health and Human Services (“HHS”) to set national standards and regulations for transmitting certain health information and for protecting patient privacy.
HHS promulgated regulations under the Administrative Simplification provisions including the Privacy Rule, the Security Rule, the Enforcement Rule, as well as transaction and code set standards that apply to electronic exchanges involving the transfer of information. These regulations:
HIPAA applies to Covered Entities: health care providers, health insurance plans, and health care clearinghouses. Covered Entities must comply with HIPAA’s requirements to protect the privacy and security of health information and provide individuals with certain rights with respect to their PHI.
In January of 2013, the U.S. Department of Health and Human Services issued a Final Omnibus Rule (“Final Rule”) modifying HIPAA and implementing provisions of the Health Information Technology for Economic and Clinical Health Act of 2009 (“HITECH”). The Final Rule further strengthens the privacy and security protections for health information established under HIPAA.
The HHS’ Office of Civil Rights (“OCR”) is responsible for enforcing HIPAA’s Privacy and Security Rules. Additionally, HITECH granted State Attorneys General the authority to bring civil actions and obtain damages on behalf of state residents for violations of the HIPAA Privacy and Security Rules.
HIPAA establishes both civil monetary penalties and federal criminal penalties for the impermissible use or disclosure of unsecured PHI in violation of HIPAA’s Privacy and Security Rules. Civil penalties range from $100 per violation per incident, to $1,500,000 for all such violations of a single provision in a calendar year. Criminal penalties include fines up to $250,000 and up to ten (10) years imprisonment.
HIPAA also addresses use of PHI for research purposes. HIPAA requires either a patient authorization or a waiver of the authorization requirement for the use, disclosure or creation of identifiable health information for research.
An authorization is not required for research using only “de-identified” data. If a researcher uses health information from which direct identifiers have been removed, then no authorization is required but the researcher must enter into a Data Use Agreement with the Covered Entity that holds the records.
HIPAA addresses the need for Covered Entities to respect patient confidentiality when engaging in marketing or development activities. Consistent with current University practice, these activities must be conducted in accordance with HIPAA and University policies.
HIPAA defines marketing as a communication about a product or service that encourages the recipient of that communication to purchase the product or service. For most marketing activities, HIPAA requires a signed authorization from the individual to whom the marketing is directed. Marketing does not include face-to-face communications made by a Covered Entity to an individual; promotional gifts of nominal value provided to individuals by a Covered Entity; prescription refill reminders or information about a drug currently prescribed for an individual. Nor does HIPAA consider communications for care management or to recommend alternative treatments to constitute marketing, unless a provider has received payment from a third party for making the communication.
For fundraising activities, HIPAA allows the use and disclosure of only certain demographic information and other PHI without a signed patient authorization. Additionally, each fundraising solicitation must include an easy means for the recipient to opt out of receiving fundraising communications in the future.
These policies apply to all individuals in any office, department or section which seeks to use PHI for marketing and/or fundraising purposes.
Under the HIPAA Privacy Rule individuals have the following rights:
The University must adhere to HIPAA’s administrative requirements, including the following:
The Security Rule establishes the national security standards to protect individuals’ electronic PHI created, received, used, or maintained by a Covered Entity (or Business Associate). The Security Rule mandates administrative, physical, and technical safeguards to ensure the confidentiality, integrity, availability, and security of electronic PHI. UMKC is required to apply these standards to all health information pertaining to an individual that is electronically maintained or transmitted and must: