{"id":100,"date":"2009-09-22T06:17:01","date_gmt":"2009-09-22T13:17:01","guid":{"rendered":"http:\/\/www.aarontitus.net\/blog\/?p=100"},"modified":"2010-09-28T06:33:31","modified_gmt":"2010-09-28T13:33:31","slug":"hipaa-breach-notification-requirements-effective-september-23-2009","status":"publish","type":"post","link":"http:\/\/www.aarontitus.net\/blog\/2009\/09\/22\/hipaa-breach-notification-requirements-effective-september-23-2009\/","title":{"rendered":"HIPAA Breach Notification Requirements Effective September 23, 2009"},"content":{"rendered":"<p>The department of Health and Human Services (HHS) and the FTC have issued a new <a href=\"http:\/\/edocket.access.gpo.gov\/2009\/E9-20169.htm\">interim final rule<\/a> governing health information breach notification requirements.  I <a href=\"http:\/\/jeffreyneu.com\/20090318184\/how-to-write-an-arra-breach-notification-letter.html\">blogged on this issue<\/a> back in March 2009, just after the stimulus package, <em>American Recovery and Reinvestment Act of 2009<\/em> (ARRA), passed.<\/p>\n<p>This rule, issued in response to <em>ARRA<\/em>, goes into effect on Wednesday. At that point, all HIPAA-covered entities and their business associates must notify individuals and HHS when personal health information has been breached. HIPAA-covered entities include health plans, health care clearinghouses, or health care providers. The rule also covers &#8220;business associates&#8221; which include billing companies, transaction companies, lawyers, accountants, managers, administrators, or anyone who handles health information on behalf of a HIPAA-covered entity.<\/p>\n<p>A breach is when individually identifiable health information is acquired, used, accessed, or disclosed to an unauthorized party, in a way that compromises its security or privacy. A &#8220;breach&#8221; does not include inadvertent disclosures among employees who are normally authorized to view protected health information. A breach also does not include exposure of encrypted personal health information, for example.<\/p>\n<p>When a breach occurs, the covered entity must notify victims and the Secretary of Human Services &ldquo;without unreasonable delay,&rdquo; and within 60 days of the discovery of the breach. The covered entity must notify the individual directly if possible (ie, by mail), and must also post a notice on its website if the breach involves 10 or more victims who are not directly reachable. If the breach involves more than 500 residents of a single state, the covered entity must also notify statewide media.<\/p>\n<p>In certain limited circumstances a vendor might be subject to HHS and FTC notification rules. In this case, a vendor which serves the public <em>and<\/em> HIPAA-covered entities may comply with both rules by providing notice to individuals and the HIPAA-covered entity. In many instances, entities covered by this rule must also comply with applicable State notification laws. The test for pre-emption is whether the State law is &#8220;contrary,&#8221; to the federal law or whether &#8220;a covered entity could find it impossible to comply with both the State and federal requirements.&#8221;<\/p>\n<h1>Compliance<\/h1>\n<p>Of course, the best way to comply with the law is to avoiding breaches altogether. The most straightforward way to avoid having a breach is to encrypt personal health information. But if a breach does occur, complying with the law is straightforward. In addition to the requirements above, the notification must include a brief description of the incident, including the following information:<\/p>\n<ul>\n<li>Date of the breach;<\/li>\n<li>Date of discovery;<\/li>\n<li>Description of the types of protected health information breached;<\/li>\n<li>Steps individuals should take to protect themselves from potential harm resulting from the breach;<\/li>\n<li>A brief description of the investigation, efforts to minimize losses and prevent future breaches;<\/li>\n<li>Contact information for individuals who wish to ask questions or learn more information, including a toll-free phone number, e-mail address, website, or postal address.<\/li>\n<\/ul>\n<p>Beyond that, you&#8217;ll have to <a href=\"http:\/\/jeffreyneu.com\/20090318184\/how-to-write-an-arra-breach-notification-letter.html#image\">minimize your losses<\/a> by repairing your company&rsquo;s public image, regaining your customers&rsquo; trust, and mitigating civil liability.<\/p>\n<p><em>References: 45 CFR parts 160, 162, and 164.<\/em><\/p>\n<p><em>Note: This article was originally published on the <a href=\"http:\/\/jeffreyneu.com\/20090919229\/HIPPA-Breach-Notification-Requirements-Effective-September-23-2009.html\">J.C. Neu &amp; Associates Blog<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The department of Health and Human Services (HHS) and the FTC have issued a new interim final rule governing health information breach notification requirements. I blogged on this issue back in March 2009, just after the stimulus package, American Recovery and Reinvestment Act of 2009 (ARRA), passed. This rule, issued in response to ARRA, goes [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[10,9],"tags":[],"_links":{"self":[{"href":"http:\/\/www.aarontitus.net\/blog\/wp-json\/wp\/v2\/posts\/100"}],"collection":[{"href":"http:\/\/www.aarontitus.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.aarontitus.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.aarontitus.net\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/www.aarontitus.net\/blog\/wp-json\/wp\/v2\/comments?post=100"}],"version-history":[{"count":5,"href":"http:\/\/www.aarontitus.net\/blog\/wp-json\/wp\/v2\/posts\/100\/revisions"}],"predecessor-version":[{"id":221,"href":"http:\/\/www.aarontitus.net\/blog\/wp-json\/wp\/v2\/posts\/100\/revisions\/221"}],"wp:attachment":[{"href":"http:\/\/www.aarontitus.net\/blog\/wp-json\/wp\/v2\/media?parent=100"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.aarontitus.net\/blog\/wp-json\/wp\/v2\/categories?post=100"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.aarontitus.net\/blog\/wp-json\/wp\/v2\/tags?post=100"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}