Is HIPAA's New Harm Threshold Good News or Bad?
HHS' interim final rule on breach notification released last week included most of the same requirements in the HITECH Act regarding breach notification:
- Immediate notification to victims on all breaches
- Notification to HHS on all breaches (immediate if 500 or more victims)
- Notification to media outlets on breaches of 500 or more patient records
- Valid encryption processes for PHI in databases consistent with National Institute of Standards and Technology (NIST)
However, there is something new and significant—a "harm threshold" provision that will help covered entities and business associates (BAs) determine whether or not to report a breach.
HHS said in the interim final rule that many commenters on the draft guidance in April suggested HHS add a "harm threshold such that an unauthorized use or disclosure of [PHI] is considered a breach only if the use or disclosure poses some harm to the individual."
HHS agreed. Now, covered entities and their BAs will perform a risk assessment to determine if there is significant risk of harm to the individual whose PHI was inappropriately dispensed into the wrong hands.
According to the interim final rule, the important questions are:
- In whose hands did the PHI land?
- Can the information disclosed cause "significant risk of financial, reputational, or other harm to the individual"?
- Was mitigation possible? For example, can you obtain forensic proof that a stolen laptop computer's data was not accessed?
In certain cases, if the information includes only a patient's name and the fact they've had services at the hospital, that's no harm, no breach.
But what if the information includes the patient's oncology treatments? Lots of potential harm there. And that's a breach.
This is good news for covered entities, especially when you look at all those faxes with PHI that go to the wrong address in a hospital. If that fax goes to another HIPAA covered entity who immediately shreds it, no breach notification required.
"It's good news since it appropriately lets organizations off the hook when the breach, as defined by the Recovery Act, doesn't appear to put the patient or plan member at measurable risk," says Kate Borten, CISSP, CISM, president of The Marblehead Group in Marblehead, MA.
- Resisting the Healthcare Consolidation Frenzy
- MGMA Urges 'End-to-End' ICD-10 Testing
- 1 in 5 CT Screenings for Lung Cancer Results in Overdiagnosis
- New G-Codes to Pay Doctors for Broad Array of Non-Face-to-Face Care
- Scary Financial Challenges for 2014
- Give Nurses in Wheelchairs a Chance
- MU Compliance Announcement Sparks Concern, Confusion
- 3 Better Ways to Market Bariatric Surgery
- HL20: George Halvorson—Expectations for Success
- Top 3 Health Plan Game Changers of 2013