Officials focus on weak links in privacy

 

Connecting state and local government leaders

HHS, partners make securing patient data a specific plank of their platform.

Between May 2005 and this June, a front-desk coordinator of a large medical practice in Florida sold patient information on 1,100 people to a cousin, who allegedly used the confidential data to submit fraudulent Medicare claims.Fortunately for the 1,100 patients, the two were caught. A federal grand jury in Miami indicted them earlier this month.But the incident underscores the need for more comprehensive privacy provisions as electronic health records become more widely available. And as the use of electronic records expands, there is a sense of urgency building among health IT proponents to ensure privacy.Privacy has been an embedded component of electronic health records for the Health and Human Services Department and the collaborative groups that are conducting technical, standards, business process and policy tasks. But now HHS officials and their partners are elevating privacy as a separate component.For interoperable health IT systems to be effective, privacy and security must be built in from the ground up, said Paul Feldman, deputy director of the Health Privacy Project, a consumer privacy group, and co-chairman of the American Health Information Community's Confidentiality, Privacy and Security Work Group.'It's a cautionary tale,' Feldman said. 'We share the tension that the administration feels that we want this to be adopted, and the benefits to patients and consumers are enormous. But we want it to be done right, with confidentiality and security in place.'HHS and its partners recently formed the Confidentiality, Privacy and Security Work Group under AHIC, a public/private advisory organization. The working group will tackle privacy and security issues that are universal across the health IT environment as well as within HHS individual efforts. AHIC then will make recommendations for HHS to consider turning into national policy.'Privacy is incredibly important as we look at all our health IT initiatives. We are trying to work on privacy simultaneously with some of the technology issues and incorporated into the technological solutions,' said Jodi Daniel, director of the Office of Policy and Research at HHS' Office of the National Coordinator for Health IT and the lead on privacy issues.Later this month, the working group will undertake how to apply user authentication and identity-proofing to establish and verify identity in electronic health records.'We started with that because they are the first issues to address when somebody accesses a system,' Daniel said, adding that she anticipates recommendations by year-end.The group then will wrestle with how to ensure correct matching of patients' health data and whether different rules should apply to more sensitive information.The Health Insurance Portability and Accountability Act, the federal law that covers data transmission in health care transactions for claims processing, acts as a floor for privacy and security. Many states, however, have stricter privacy laws, which could hinder the exchange of data across a nationwide health information network (NHIN).'With the world of electronic data interchange developing, there may bea need for other practices,' Daniel said.The national coordinator's office over the last two years has contracted with collaborative groups whose missions sum up current health IT efforts. The groups have set out to:Health IT components such as electronic health records will reduce medical mistakes, improve the quality of care and cut costs because they can provide all a patient's information at the point of care, HHS secretary Mike Leavitt has said. The HHS-led American Health Information Community makes decisions about how to proceed with the development of interoperable health care systems.AHIC has selected early versions of health IT systems that should begin to be realized next year. They include lab results as a precursor for electronic health records, secure messaging for chronic care, emergency room symptom data for bio-surveillance and personal health records, including patient histories and medication lists, for consumer empowerment.To assess what the problems may be, HHS hired RTI International of Research Triangle Park, N.C., to form the Health Information Security and Privacy Collaborative. It has an agreement with 34 states to assess their privacy practices, policies and underlying laws to identify barriers to state electronic health data exchange.RTI and HHS will meet later this fall with the state and regional representatives to identify solutions to those barriers and later implementation plans for carrying out the plans, said Susan Christensen, senior adviser for privacy issues at HHS' Agency for Healthcare Research and Quality, which administers the contract.'You could look at all the state laws in all jurisdictions that are involved and come up with so many potential conflicts that it would take you forever to resolve them,' Christensen said. 'Are they actually getting in the way, or is it the way people interpret those laws, or are there other things that they are doing in the name of privacy and security that aren't even based on law or regulations?'For example, one state might not allow another state access to a patient's Social Security number, which could affect the use of a record locator service. Or, a state could have different consent laws for physicians than for hospitals.The goal is to identify good practices and common approaches to solve difficult problems.'We want to begin to get an idea of best practices, or practices that affect health information exchange that you want to keep for whatever reason,' Christensen said.There's a commonality across states, but each state is implementing differently. States have to ask themselves if they want to keep the same privacy practices as they move to electronic records exchange, she added.'Are they doing this to comply with HIPAA, because someone said to do it or it's just good business, such as using aliases with high-profile patients, even though it's not required by law?' Christensen said.Health plans, providers and public health systems have created up to 300 business practices that are part of privacy and health data exchange, she said. HHS is reviewing these 300 practices under nine domains, such as user and entity authentication, information authorization and access controls, and patient and provider identification, to match identities across multiple systems and locate personal health information across enterprises.States will be able to filter the practices they want through working groups for legality, variations and solutions to assess what is required by law and what is not. The idea is to accommodate variations where possible, after determining which ones are needed and which ones not.'I think with technology we may be able to address more of the variations than we thought, but we don't know what they are,' Christensen said.RTI will report to HHS on the assessment of variations later this year, followed early next year by a national meeting of the states to finalize the assessments and propose solutions for the variations and then a proposed implementation plan, Christensen said.HIPAA has provided the means for health care organizations to protect their patients' data. But it won't cover everything on a nationwide network, said Paul Tang, vice president and chief medical information officer of the Palo Alto Medical Foundation in Palo Alto, Calif. He also is a member of the privacy and confidentiality subcommittee of HHS' National Committee on Vital and Health Statistics, which recently reported on privacy and security implications of NHIN. The AHIC privacy group will include those recommendations in its work.'Whereas an individual health care organization has fairly good control over users of its systems, it's much harder to authenticate 250 million people (on NHIN),' Tang said.Authentication, then, is one of the key technical, policy and business components for interoperable electronic health records, he said.Little guidance exists for organizations that will move data around NHIN. So it is critical to meet consumers' expectations.Trust is important so that patients and physicians will use NHIN, Tang said.'It doesn't necessarily mean that you follow one law. It's a sense that you're going to do with my data what I expect you to do,' Tang said.One of the levers that the federal government has is that HHS can require agencies, such as the Veterans Affairs Department, to comply with the privacy and security policies that AHIC recommends as a condition for participating in NHIN, Tang said.Where privacy and security policies, practices and business processes mesh is the Nationwide Health Information Network, for which four contractors'Accenture LLP of Chicago, Computer Sciences Corp., IBM Corp. and Northrop Grumman Corp.'are developing prototypes.HHS has planned a national conference next month in Washington to consider privacy, security and confidentiality issues in NHIN.Northrop Grumman, for example, is implementing standard technologies to ensure security of access to the system and encryption of the data as it is transported between systems, said Robert Cothren, Northrop Grumman's chief scientist. They are mature technologies similar to cybersecurity for doing business over the Internet.Authentication and authorization establish the ability to access data in a secure way. The electronic health record, which is at the most local level of any health IT system, handles authentication and authorization. The EHR also is the gateway to NHIN, making it imperative that these processes have privacy and security standards in place, Cothren said.For example, a hospital could validate the identity of a physician and that the physician has access to its system and provides a user identification and password.'Authentication is a technology issue; authorization is a policy issue. We're letting the edge system dictate those rather than NHIN enforcing anything on its own,' Cothren said.Northrop Grumman also is providing the ability of the consumer or patient to control access to information through a consent registry.'It's one thing to say that if you're a physician, you've got access to all my information. But there are circumstances when the consumer would want control over what information is transferred in the NHIN,' he said.For example, as part of a medication history, the consumer may not want everyone who has access to NHIN to know of the consumer's treatment for depression or substance abuse. If someone asks for a medication history, the consumer can have that medication deleted from the response.However, in a process that will likely be repeated as NHIN is developed and assembled, technology will prompt debate to settle the policy questions that arise from advanced capabilities, he said.'You want to earn and maintain the trust of the public, you want to do good by the patient and avoid doing harm in privacy,' Tang said. 'You have to figure out how to optimize all of those.'

7 keys to ensure privacy

Ensuring privacy protection of electronic health records is a must for the Health and Human Services Department'at least it should be, according to privacy experts. Here is what they believe should be done to protect users' privacy:

1. Recognize rights. Every American has the right to privacy. People should have the choice to opt in or out of having their medical records available electronically, according to Deborah Peel, founder of Patient Privacy Rights of Austin, Texas, a nonprofit organization focusing on protecting patients' privacy.

2. Enforce HIPAA. Breaches of the Health Insurance Portability and Accountability Act are going unpunished, according to Paul Feldman, deputy director of the Health Privacy Project of Washington, a consumer privacy group, and co-chairman of the Confidentiality, Privacy and Security Work Group under the public-private American Health Information Community. Many people are concerned about their medical records being breached, and little is being done to ensure violators are penalized.

3. Revise HIPAA. The 'accounting of disclosures' provision needs to be expanded. Experts agree health care providers should be required to keep track of all disclosures. Audit trails of all disclosures should be available.

4. Stop and look. Pam Dixon, founder and executive director of the World Policy Forum'a nonprofit public interest research and consumer education group'said a robust look at policy is in order to ensure privacy problems in pilot projects are addressed. Medical identity theft and confidentiality problems need fixing before the government takes any further steps.

5. Wave red flags. Experts say the government needs better policies to inform users when identity theft has occurred. As seen in the Veterans Affairs Department breach earlier this year, federal officials did not inform potential victims for weeks. The red-flag policy needs to be incorporated into the health care context.

6. Selective eyes. No one should be forced to disclose private information to insurance agencies, health care providers, employers or financial and educational institutions. Only with consent should these parties be privy to health records.

7. One and done. Disclosure of information for one purpose does not render it permissible to pass the information on to other parties. Reuse of data without consent, according to Peel, is a violation of patient rights.

You could look at all the state laws in all jurisdictions ... and come up with so many potential conflicts that it would take you forever to resolve them.' Susan Christensen, HHS

Rick Steele



























  • Establish criteria for certifying electronic health record systems

  • Harmonize data exchange standards

  • Develop prototypes of a nationwide health information network architecture

  • Evaluate the variations in state privacy laws.









Different rules



































Setting standards





















X
This website uses cookies to enhance user experience and to analyze performance and traffic on our website. We also share information about your use of our site with our social media, advertising and analytics partners. Learn More / Do Not Sell My Personal Information
Accept Cookies
X
Cookie Preferences Cookie List

Do Not Sell My Personal Information

When you visit our website, we store cookies on your browser to collect information. The information collected might relate to you, your preferences or your device, and is mostly used to make the site work as you expect it to and to provide a more personalized web experience. However, you can choose not to allow certain types of cookies, which may impact your experience of the site and the services we are able to offer. Click on the different category headings to find out more and change our default settings according to your preference. You cannot opt-out of our First Party Strictly Necessary Cookies as they are deployed in order to ensure the proper functioning of our website (such as prompting the cookie banner and remembering your settings, to log into your account, to redirect you when you log out, etc.). For more information about the First and Third Party Cookies used please follow this link.

Allow All Cookies

Manage Consent Preferences

Strictly Necessary Cookies - Always Active

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data, Targeting & Social Media Cookies

Under the California Consumer Privacy Act, you have the right to opt-out of the sale of your personal information to third parties. These cookies collect information for analytics and to personalize your experience with targeted ads. You may exercise your right to opt out of the sale of personal information by using this toggle switch. If you opt out we will not be able to offer you personalised ads and will not hand over your personal information to any third parties. Additionally, you may contact our legal department for further clarification about your rights as a California consumer by using this Exercise My Rights link

If you have enabled privacy controls on your browser (such as a plugin), we have to take that as a valid request to opt-out. Therefore we would not be able to track your activity through the web. This may affect our ability to personalize ads according to your preferences.

Targeting cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising.

Social media cookies are set by a range of social media services that we have added to the site to enable you to share our content with your friends and networks. They are capable of tracking your browser across other sites and building up a profile of your interests. This may impact the content and messages you see on other websites you visit. If you do not allow these cookies you may not be able to use or see these sharing tools.

If you want to opt out of all of our lead reports and lists, please submit a privacy request at our Do Not Sell page.

Save Settings
Cookie Preferences Cookie List

Cookie List

A cookie is a small piece of data (text file) that a website – when visited by a user – asks your browser to store on your device in order to remember information about you, such as your language preference or login information. Those cookies are set by us and called first-party cookies. We also use third-party cookies – which are cookies from a domain different than the domain of the website you are visiting – for our advertising and marketing efforts. More specifically, we use cookies and other tracking technologies for the following purposes:

Strictly Necessary Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Functional Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Performance Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Social Media Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Targeting Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.