Is HIPAA's New Harm Threshold Good News or Bad?
HHS' interim final rule on breach notification released last week included most of the same requirements in the HITECH Act regarding breach notification:
- Immediate notification to victims on all breaches
- Notification to HHS on all breaches (immediate if 500 or more victims)
- Notification to media outlets on breaches of 500 or more patient records
- Valid encryption processes for PHI in databases consistent with National Institute of Standards and Technology (NIST)
However, there is something new and significant—a "harm threshold" provision that will help covered entities and business associates (BAs) determine whether or not to report a breach.
HHS said in the interim final rule that many commenters on the draft guidance in April suggested HHS add a "harm threshold such that an unauthorized use or disclosure of [PHI] is considered a breach only if the use or disclosure poses some harm to the individual."
HHS agreed. Now, covered entities and their BAs will perform a risk assessment to determine if there is significant risk of harm to the individual whose PHI was inappropriately dispensed into the wrong hands.
According to the interim final rule, the important questions are:
- In whose hands did the PHI land?
- Can the information disclosed cause "significant risk of financial, reputational, or other harm to the individual"?
- Was mitigation possible? For example, can you obtain forensic proof that a stolen laptop computer's data was not accessed?
In certain cases, if the information includes only a patient's name and the fact they've had services at the hospital, that's no harm, no breach.
But what if the information includes the patient's oncology treatments? Lots of potential harm there. And that's a breach.
This is good news for covered entities, especially when you look at all those faxes with PHI that go to the wrong address in a hospital. If that fax goes to another HIPAA covered entity who immediately shreds it, no breach notification required.
"It's good news since it appropriately lets organizations off the hook when the breach, as defined by the Recovery Act, doesn't appear to put the patient or plan member at measurable risk," says Kate Borten, CISSP, CISM, president of The Marblehead Group in Marblehead, MA.
- CMS to Speak with ICD-10 Backers Tuesday
- Boston Marathon Bombing Yields Lessons for Hospitals
- Governor Details Healthcare Payment Reform Path in Arkansas
- Reform Puts Vise Grips on Physicians
- MetroHealth Revs Its Population Health Engine
- Medicare Opt-Out a Viable Physician Strategy
- Hospital Groups Back NQF Report on Patient Sociodemographics
- Providers Lag as Consumers Set Agenda
- NPP Demand Rising Under Value-Based Care Models
- HIX Success Could Generate Add-On Revenue for CT