Health Law Gurus

Health Law Gurus

Health Law: News,
Commentary & Insights

Organizations Want to Cry After WannaCry Ransomware Attacks

Posted in Cybersecurity, HIPAA, HITECH, Privacy, Security, Trends

Earlier this month a massive ransomware attack spread throughout 150 countries, infecting 300,000 computers and crippling businesses across the globe. The ransomware, called “Wannacry,” infiltrated a variety of institutions, encrypting the user’s files and demanding payment of $300-$600 in bitcoin to unfreeze files. Hundreds of hospitals and health clinics in the British National Health Service were infiltrated by the WannaCry ransomware. As a result, the National Health Service was required to reroute patients and reschedule surgeries and appointments while its files were encrypted. As evidenced by the WannaCry attack and the increasing frequency of ransomware attacks, particularly ransomware attacks targeting hospitals, health care entities need to be vigilant regarding the secure storage of patient information, and proactive to ensure patient continuity of care in case of a ransomware attack. Continue Reading

Securing ePHI in a Mobile Health World

Posted in HIPAA, Privacy, Security, Technology, Telemedicine

Could a lost cell phone or laptop cost your organization millions of dollars?

Mobile devices have enabled vast improvements in the efficiency and quality of healthcare delivery. Through the use of mobile devices, patients and providers can access real-time information that can lead to better health outcomes through improving medication compliance and understanding of treatment instructions, increasing access to care through telehealth and remote care functionalities, and enhancing the quality of physician-patient interactions. Additionally, the ability to collect and track data regarding health outcomes and deviations has enormous benefits for population health research. However, the proliferation of mobile devices in the healthcare space can create issues under the Health Information Portability and Accountability Act (HIPAA). Mobile devices can lead to patient privacy issues and can raise numerous concerns over whether covered entities have sufficient safeguards in place to secure patient protected health information (PHI). Continue Reading

BEWARE OF THE MAN-IN-THE-MIDDLE: Malicious Eavesdroppers on the Internet

Posted in Compliance Issues, Cybersecurity, Privacy, Security, Technology

Imagine this: Dr. Primary is treating Patty Patient for substance abuse and emails Patty Patient’s protected health information (PHI) to a treatment clinic. Before the email arrives at the clinic, it is intercepted by a third party, Evan Eavesdropper, who publishes the PHI on the internet.  Evan Eavesdropper also decides to alter the PHI in the email before sending the email on to the clinic.  When the clinic receives the email with the altered PHI, the clinic thinks that Patty Patient is not a good candidate for its treatment program and emails its conclusions back to Dr. Primary.  Evan Eavesdropper gleefully changes this email and accepts Patty Patient into the clinic’s treatment program.  Patty Patient arrives at the clinic and finds there is no place for her in the treatment program. Continue Reading

Medical Marijuana Act Clouds the Rights of Employers to Establish and Enforce Marijuana Policies

Posted in Medical Marijuana

Pennsylvania’s recently passed Medical Marijuana Act (MMA) has left employers dazed and confused about whether they may continue to enforce zero tolerance drug policies. The MMA, which provides qualifying patients with access to medical marijuana through a safe and effective delivery method, is intended to balance patient need for access with patient safety. However, balancing these interests is not always an easy task, especially because marijuana remains an illegal substance under the Federal Controlled Substances Act. The attempt to balance patient access and safety, and the juxtaposition between state and federal law, can put employers in a sticky situation, particularly when it comes to establishing and enforcing zero tolerance drug policies. Continue Reading

CMS Grants Eleventh Hour Extension for Attesting to Meaningful Use

Posted in EHR, Meaningful Use

Doctor using digital tablet on gray background

Providers participating in the Medicare Electronic Health Record (EHR) Incentive Program now have an additional thirteen days to register and attest to meeting the meaningful use requirements for 2016. The Centers for Medicare & Medicaid Services has extended the reporting deadline until March 13, 2017, at 11:59 p.m. ET. This extension is intended to allow providers additional time to attest to the 2016 program requirements and avoid a 2018 payment adjustment. Continue Reading

Time is of the Essence When Reporting a Breach of PHI

Posted in Business Associates, Covered Entities, HIPAA, Privacy, Security

The failure to timely report a breach of unsecured protected health information (PHI) has cost Presence Health (one of the largest health systems in Illinois) almost half of a million dollars.

Earlier this month, Presence Health agreed to pay $475,000 and enter into a corrective action plan (CAP) with the Office for Civil Rights (OCR) based upon its failure to timely report a data breach in accordance with the Health Insurance Portability and Accountability Act (HIPAA) and HIPAA’s Breach Notification Rule. Continue Reading

20 Years of HIPAA – Where We’ve Been and Where We’re Going

Posted in Guest Contributor, HIPAA, Privacy, Security
Marie Turnbull Director, Client Relations

Marie Turnbull
Director, Client Relations

On August 21, 1996, the Health Insurance Portability and Accountability Act of 1996 (HIPAA) was signed into law by President Bill Clinton. The original purpose of the Act, which amended the Internal Revenue Code of 1986, was to improve the portability and continuity of health insurance coverage, combat waste, fraud, and abuse, promote the use of medical savings accounts, improve access to long-term care services, and simplify the administration of health insurance.

At the time, there were no such things as electronic medical records (EMR), electronic Health Information Exchange (HIE), Covered Entities or Business Associates. Healthcare administration and patient privacy was complicated by varying rules and regulations across states, and a lack of uniformity at the federal level. Experts recognized the need to standardize regulations, better protect patient privacy and allow employees to retain health coverage when leaving their jobs. They also recognized the increased use of technology, and foresaw its coming impact on the healthcare industry. Continue Reading

Countdown to Compliance for Section 1557 of the Patient Protection and Affordable Care Act

Posted in Affordable Care Act (ACA), Compliance Issues

If you are an entity covered by Section 1557 of the Patient Protection and Affordable Care Act (Section 1557), you have less than a week to prepare your non-discrimination notices and taglines. The final rule implementing 1557 requires that by October 16, 2016, healthcare providers and other covered entities publish and disseminate non-discrimination notices, including disclosures that they provide language assistance services to individuals with limited English proficiency (LEP).

The U.S. Department of Health and Human Services (HHS), Office for Civil Rights issued the final rule implementing Section 1557 on May 18, 2016. Section 1557 prohibits discrimination in health care programs and activities on the basis of race, color, national origin, sex, age, or disability. Section 1557 applies to “covered entities” or any entity that operates or administers either: (i) a health program or activity, any part of which receives federal financial assistance provided or made available by HHS; (ii) a health program or activity administered by HHS; or (iii) a health program or activity administered by an entity established by Title I of the Affordable Care Act.

Among the requirements included in Section 1557, is the requirement that covered entities publish and disseminate non-discrimination notices. To help you prepare your notices for the October 16th deadline, the Health Law Gurus have outlined what you need to know. Continue Reading

The Doctor Will See You Right Now: Understanding Urgent Care Centers

Posted in Pennsylvania, Trends

In today’s busy world, convenience is a prized commodity. From pre-ordering and paying online for your favorite Starbucks drink to pulling up instantaneous directions on Google Maps, people value solutions that save time and make their lives easier. This trend carries over into the health care industry; most notably in the increasing popularity of urgent care centers. Since health insurance companies, like Independence Blue Cross, began to cover the health care provided at these clinics, their popularity and prevalence has skyrocketed.

Urgent care centers are modeled to facilitate quality, affordable, and convenient medical care for non-life threatening injuries and illnesses. Urgent care centers generally allow for walk-in appointments, which spares patients the time required to schedule an appointment with a primary care physician and to wait for the appointment time and date. Moreover, urgent care centers tend to have flexible hours. They may be open on weekends or evenings, and may be more convenient for someone juggling a busy schedule. In addition, many urgent care centers have x-rays or laboratory testing, but are generally less expensive than a hospital emergency room. Continue Reading

Record-Breaking HIPAA Settlement Sends Strong Message to Covered Entities

Posted in Covered Entities, HIPAA, Privacy, Security

This month marked the largest HIPAA settlement to-date for a single entity. Advocate Health Care Network (“Advocate”) agreed to pay $5.5 million and adopt a corrective action plan after an investigation by the Department of Health and Human Services’ Office for Civil Rights (“OCR”) revealed that Advocate’s widespread noncompliance with the requirements of HIPAA affected the protected health information (“PHI”) of four million individuals.

OCR’s investigation into Advocate began in 2013 after its subsidiary, Advocate Medical Group (“AMG”), reported three separate data breaches. AMG reported: (i) a laptop computer stolen from an AMG office building, (ii) unauthorized access into a business associate’s computer network, and (iii) an unencrypted laptop taken from an employee’s unlocked vehicle. In combination, the three data breaches compromised the names, addresses, credit card information, clinical information, and health insurance information of four million individuals. Continue Reading