SlideShare a Scribd company logo
1 of 4
ONC Report Describes Privacy and Security Gaps at Non-HIPAA Covered Entities [Study]
Almost every individual on the Internet of Things (IOT) grid already has a copious amount of
personal data that stem from things like the monitoring of exercise, glucose levels, and personal
location and other movements, which are constantly added to the cloud on a daily basis. Even
small amounts of this information, according to a 2013 FTC report, could be indiscriminately
used to gain pricing advantages and also used to unfairly target certain demographic groups in
advertising and marketing campaigns. So, it’s more important than ever to be aware of the
number of ways that medical data can be used for inappropriate and unethical means in the
marketplace.
The oversight-gaps between HIPAA-covered entities that collect health data and those that
are not regulated by HIPAA poses risks to individuals who share their information electronically.
And these risks often outweigh the benefits of the virtual world and the Internet of Things.
The recent FTC report on IOT and privacy issues shed light on the various other ways that
information can potentially be compromised in the electronic age, with a lack of vigilance and
due diligence. The use of multiple “smart devices” often makes life easier and saves the modern
citizen a lot of valuable time and energy. But while it’s true that these “tools of convenience”
bring with them many positives, the use of devices such as wearable fitness and medical bands,
watches and monitors, home surveillance and security systems, appliance smart meters, and
GPS and transponder boxes, are also data transmitters that can jeopardize the privacy
concerns of HIPAA-related matters.
Since there no regulatory policies in place for these smart devices, the Universityof Miami’s
article from the Office of HIPAA Privacy and Security underscores some of these concerns
and raises questions as to how consumers can combat the risks that come with the collection of
enormous amounts of data stored by file and date sharing on sites such as Instagram, Google
Drive and Microsoft OneDrive, DropBox, search engines queries, and the ubiquitous social
media outlets. There is also the issue of how personal benefits can still compromise a much
larger societal problem of increased risk/benefit concerns that comes with trying to improve
health-care through data collection. Yes, consumers can take steps to maximize privacy
settings on their personal devices, but that still doesn’t address what regulatory policies, if any,
should be put into place to increase security measures for the user.
HIPAA’s Electronic Data Interchange Rule (EDI) “strictly govern(s) the way data is
electronically transferred from one computer to another,” and offers some hope for heightened
data security, but is highly technical and requires sophisticated understanding, possibly even
demanding the use of a consultant in some cases to achieve compliance with HIPAA standards.
Although the aim of EDI is to lighten the data reporting load in the healthcare industry, there are
still several factors that may determine whether or not you need to seek the advice of a
consultant in order to meet compliance standards: concerns regarding the use of intermediaries
for electronic claims versus a direct-pay method by the provider, and the overall acumen and
sophistication of in-house IT departments. EPI stresses that as long as a provider is in
compliance the methodology is discretionary when it comes to electronic transmission
procedures. But it still remains a vitally important consideration for issues facing the healthcare
industry’s privacy policies.
A little over a month ago, the HIPAA Journal reported on another recent report issued by the
ONC. The ONC concluded that the explosion of IOT has led to the collection of data by non-
HIPAA entities not subject to the regulatory policies of HIPAA, thus compromising the health
information of many individuals and placing them at risk for data theft and unwanted
disclosures. The report also points to a need for better education policies to increase public
awareness on what information is and is not protected under regulatory guidelines.
Moreover, data from a non-HIPAA-entity may not even be available to the individual upon
request, something that is an unquestionable right under HIPAA policies. And further, terms of
use, data terminologies, rights of use, and information about collection and dissemination of
limitations and third-party access are often vague, if not non-existent.
Though the report stresses the progress made in these areas from efforts to inform private
sectors of abuse, deception, and/or general malfeasance, the ONC still emphasizes the areas
where individuals may not be protected, even under HIPAA, if they are lax in self-disclosure
through such entities as social media platforms, or if they participate in self-pay boutique clinics
for medical services that are not subject to HIPAA.
But this leads to the larger point of a lack of public education policies which will ostensibly lead
to a greater understanding of what does or does not apply to individuals who utilize the
tremendous benefits of IOT. Marketers and advertisers may almost certainly balk at this. They’ll
cry that it hinders their ability to develop and contribute more and more beneficial commodities
for the overall public health issues and accompanying economic concerns over rising healthcare
costs. But even those that cater to the industry may not fully understand the implications and
ramifications of the long-term risks in healthcare and privacy issues that work from compliances
with HIPAA regulations.
The downside is that creativity and innovation may be thwarted for fear that industry regulatory
policies are too cumbersome and tedious to conform to. It is clear that some kind of federal
intervention needs to take place as technology continues to evolve.
Because the study found that lack of encryption and the lack of other general security
safeguards are currently the greatest threats to health information breaches, the ONC
recommendation is to strive to increase awareness and understanding of appropriate policies
(and the terms within), as well as greater restrictions regarding privacy-policy changes that
occur in tandem with the consumer’s permission--not mere Internet data tracking methods
without an informed consent.
Resource Links:
http://www.asha.org/practice/reimbursement/hipaa/hipaa_edi_faq/
http://www.hipaajournal.com/large-privacy-security-gaps-non-hipaa-covered-
entities-onc-report-3512/
http://privacyoffice.med.miami.edu/awareness/tips/the-internet-of-things-and-
privacy
https://www.healthit.gov/sites/default/files/reports/info_blocking_040915.pdf
https://www.ftc.gov/system/files/documents/reports/federal-trade-commission-
staff-report-november-2013-workshop-entitled-internet-things-
privacy/150127iotrpt.pdf
https://www.healthit.gov/sites/default/files/non-
covered_entities_report_june_17_2016.pdf
Meta: Health data is being collected by entities not covered by HIPAA regulations
and may be at risk—according to a recent report released by the ONR .
Keywords: health data, healthcare data privacy, healthcare data security,
healthcare information technology, ONR , HIPAA, non-HIPAA covered entities

More Related Content

What's hot

Legal issues in technology
Legal issues in technologyLegal issues in technology
Legal issues in technologyEzraGray1
 
Priv&security&profin electrcommunicationsrev9 23
Priv&security&profin electrcommunicationsrev9 23Priv&security&profin electrcommunicationsrev9 23
Priv&security&profin electrcommunicationsrev9 23Deven McGraw
 
Research on Legal Protection of Data Rights of E Commerce Platform Operators
Research on Legal Protection of Data Rights of E Commerce Platform OperatorsResearch on Legal Protection of Data Rights of E Commerce Platform Operators
Research on Legal Protection of Data Rights of E Commerce Platform OperatorsYogeshIJTSRD
 
"Data Breaches & the Upcoming Data Protection Legal Framework: What’s the Buz...
"Data Breaches & the Upcoming Data Protection Legal Framework: What’s the Buz..."Data Breaches & the Upcoming Data Protection Legal Framework: What’s the Buz...
"Data Breaches & the Upcoming Data Protection Legal Framework: What’s the Buz...Cédric Laurant
 
Role-Based Access Governance and HIPAA Compliance: A Pragmatic Approach
Role-Based Access Governance and HIPAA Compliance: A Pragmatic ApproachRole-Based Access Governance and HIPAA Compliance: A Pragmatic Approach
Role-Based Access Governance and HIPAA Compliance: A Pragmatic ApproachEMC
 
4 key technological trends that raise ethical issues
4   key technological trends that raise ethical issues4   key technological trends that raise ethical issues
4 key technological trends that raise ethical issuesRownel Cerezo Gagani
 
Privacy through Anonymisation in Large-scale Socio-technical Systems: The BIS...
Privacy through Anonymisation in Large-scale Socio-technical Systems: The BIS...Privacy through Anonymisation in Large-scale Socio-technical Systems: The BIS...
Privacy through Anonymisation in Large-scale Socio-technical Systems: The BIS...Andrea Omicini
 
Cybercrime and the Healthcare Industry
Cybercrime and the Healthcare IndustryCybercrime and the Healthcare Industry
Cybercrime and the Healthcare IndustryEMC
 
Energy Data Access_Who wants the data
Energy Data Access_Who wants the dataEnergy Data Access_Who wants the data
Energy Data Access_Who wants the dataMikhail Haramati
 
اخلاقيات الثاني
اخلاقيات الثانياخلاقيات الثاني
اخلاقيات الثانيBunayan ALdosari
 
Information governance a_necessity_in_to
Information governance a_necessity_in_toInformation governance a_necessity_in_to
Information governance a_necessity_in_toAnne ndolo
 
8MAN-Public_Sector_Data_and_Information_Security_Survey 2016
8MAN-Public_Sector_Data_and_Information_Security_Survey 20168MAN-Public_Sector_Data_and_Information_Security_Survey 2016
8MAN-Public_Sector_Data_and_Information_Security_Survey 2016Andi Robinson
 
Research on Electronic Commerce Platform Consumer Data Rights and Legal Prote...
Research on Electronic Commerce Platform Consumer Data Rights and Legal Prote...Research on Electronic Commerce Platform Consumer Data Rights and Legal Prote...
Research on Electronic Commerce Platform Consumer Data Rights and Legal Prote...YogeshIJTSRD
 
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalData Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalDr. Donald Macfarlane
 

What's hot (20)

Social & Ethical Issues in Information Systems
Social & Ethical Issues in Information SystemsSocial & Ethical Issues in Information Systems
Social & Ethical Issues in Information Systems
 
Legal issues in technology
Legal issues in technologyLegal issues in technology
Legal issues in technology
 
Priv&security&profin electrcommunicationsrev9 23
Priv&security&profin electrcommunicationsrev9 23Priv&security&profin electrcommunicationsrev9 23
Priv&security&profin electrcommunicationsrev9 23
 
Hipaa omnibus
Hipaa omnibusHipaa omnibus
Hipaa omnibus
 
Research on Legal Protection of Data Rights of E Commerce Platform Operators
Research on Legal Protection of Data Rights of E Commerce Platform OperatorsResearch on Legal Protection of Data Rights of E Commerce Platform Operators
Research on Legal Protection of Data Rights of E Commerce Platform Operators
 
"Data Breaches & the Upcoming Data Protection Legal Framework: What’s the Buz...
"Data Breaches & the Upcoming Data Protection Legal Framework: What’s the Buz..."Data Breaches & the Upcoming Data Protection Legal Framework: What’s the Buz...
"Data Breaches & the Upcoming Data Protection Legal Framework: What’s the Buz...
 
Role-Based Access Governance and HIPAA Compliance: A Pragmatic Approach
Role-Based Access Governance and HIPAA Compliance: A Pragmatic ApproachRole-Based Access Governance and HIPAA Compliance: A Pragmatic Approach
Role-Based Access Governance and HIPAA Compliance: A Pragmatic Approach
 
4 key technological trends that raise ethical issues
4   key technological trends that raise ethical issues4   key technological trends that raise ethical issues
4 key technological trends that raise ethical issues
 
Privacy through Anonymisation in Large-scale Socio-technical Systems: The BIS...
Privacy through Anonymisation in Large-scale Socio-technical Systems: The BIS...Privacy through Anonymisation in Large-scale Socio-technical Systems: The BIS...
Privacy through Anonymisation in Large-scale Socio-technical Systems: The BIS...
 
Privacy trends 2011
Privacy trends 2011Privacy trends 2011
Privacy trends 2011
 
Cybercrime and the Healthcare Industry
Cybercrime and the Healthcare IndustryCybercrime and the Healthcare Industry
Cybercrime and the Healthcare Industry
 
Energy Data Access_Who wants the data
Energy Data Access_Who wants the dataEnergy Data Access_Who wants the data
Energy Data Access_Who wants the data
 
اخلاقيات الثاني
اخلاقيات الثانياخلاقيات الثاني
اخلاقيات الثاني
 
Data Privacy
Data PrivacyData Privacy
Data Privacy
 
Information governance a_necessity_in_to
Information governance a_necessity_in_toInformation governance a_necessity_in_to
Information governance a_necessity_in_to
 
Chapter 4 MIS
Chapter 4 MISChapter 4 MIS
Chapter 4 MIS
 
Chapter 4
Chapter 4Chapter 4
Chapter 4
 
8MAN-Public_Sector_Data_and_Information_Security_Survey 2016
8MAN-Public_Sector_Data_and_Information_Security_Survey 20168MAN-Public_Sector_Data_and_Information_Security_Survey 2016
8MAN-Public_Sector_Data_and_Information_Security_Survey 2016
 
Research on Electronic Commerce Platform Consumer Data Rights and Legal Prote...
Research on Electronic Commerce Platform Consumer Data Rights and Legal Prote...Research on Electronic Commerce Platform Consumer Data Rights and Legal Prote...
Research on Electronic Commerce Platform Consumer Data Rights and Legal Prote...
 
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_finalData Protection & Security Breakfast Briefing - Master Slides_28 June_final
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
 

Viewers also liked (13)

Article Analysis--Brubaker
Article Analysis--BrubakerArticle Analysis--Brubaker
Article Analysis--Brubaker
 
Tics evidencia 2
Tics evidencia 2Tics evidencia 2
Tics evidencia 2
 
Evidencia tics 1
Evidencia tics 1Evidencia tics 1
Evidencia tics 1
 
Tics evidencia 2
Tics evidencia 2Tics evidencia 2
Tics evidencia 2
 
Lord of the Flies Example Presentation
Lord of the Flies Example PresentationLord of the Flies Example Presentation
Lord of the Flies Example Presentation
 
Marketing
MarketingMarketing
Marketing
 
Marcus smith resume 11.16
Marcus smith resume 11.16Marcus smith resume 11.16
Marcus smith resume 11.16
 
Technical Project Proposal
Technical Project ProposalTechnical Project Proposal
Technical Project Proposal
 
Evidencia 2
Evidencia 2 Evidencia 2
Evidencia 2
 
Desarrollo formas de comunicasion
Desarrollo formas de comunicasionDesarrollo formas de comunicasion
Desarrollo formas de comunicasion
 
Empresa virtual (presentacion power point)
Empresa virtual (presentacion power point)Empresa virtual (presentacion power point)
Empresa virtual (presentacion power point)
 
Building Successful Faculty Engagement Programs: March, 2016 webinar
Building Successful Faculty Engagement Programs: March, 2016 webinarBuilding Successful Faculty Engagement Programs: March, 2016 webinar
Building Successful Faculty Engagement Programs: March, 2016 webinar
 
Abundance-Inspirational Woman Magazine
Abundance-Inspirational Woman MagazineAbundance-Inspirational Woman Magazine
Abundance-Inspirational Woman Magazine
 

Similar to ONC Report Finds Privacy Risks From Non-HIPAA Data Collection

Constructing a HIPAA-compliant healthcare app from scratch
 Constructing a HIPAA-compliant healthcare app from scratch Constructing a HIPAA-compliant healthcare app from scratch
Constructing a HIPAA-compliant healthcare app from scratchTechugo
 
Running head Information security threats 1Information secur.docx
Running head Information security threats 1Information secur.docxRunning head Information security threats 1Information secur.docx
Running head Information security threats 1Information secur.docxwlynn1
 
Sarah Kim HIPAA for Small Providers
Sarah Kim HIPAA for Small ProvidersSarah Kim HIPAA for Small Providers
Sarah Kim HIPAA for Small ProvidersSarah Kim
 
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_CloudPerspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_CloudCheryl Goldberg
 
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_CloudPerspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_CloudCheryl Goldberg
 
Healthcare Information Technology Trends.docx
Healthcare Information Technology Trends.docxHealthcare Information Technology Trends.docx
Healthcare Information Technology Trends.docxwrite4
 
Information Governance in the Healthcare Industry
Information Governance in the Healthcare IndustryInformation Governance in the Healthcare Industry
Information Governance in the Healthcare IndustryAmber Guy
 
Running Head Stage 2 Sharing Data1Stage 2 Sharing Data3.docx
Running Head Stage 2 Sharing Data1Stage 2 Sharing Data3.docxRunning Head Stage 2 Sharing Data1Stage 2 Sharing Data3.docx
Running Head Stage 2 Sharing Data1Stage 2 Sharing Data3.docxjeanettehully
 
Hipaa checklist for healthcare software
Hipaa checklist for healthcare softwareHipaa checklist for healthcare software
Hipaa checklist for healthcare softwareConcetto Labs
 
HCAD_600_Paper1_Amer
HCAD_600_Paper1_AmerHCAD_600_Paper1_Amer
HCAD_600_Paper1_AmerAmer Nazar
 
Hello Shreya,Detailed analysis of data breaches that occurred in
Hello Shreya,Detailed analysis of data breaches that occurred inHello Shreya,Detailed analysis of data breaches that occurred in
Hello Shreya,Detailed analysis of data breaches that occurred inSusanaFurman449
 
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECHInformation Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECHNovell
 
POST EACH DISCUSSION SEPARATELYThe way patient data is harvested.docx
POST EACH DISCUSSION SEPARATELYThe way patient data is harvested.docxPOST EACH DISCUSSION SEPARATELYThe way patient data is harvested.docx
POST EACH DISCUSSION SEPARATELYThe way patient data is harvested.docxLacieKlineeb
 
Article 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking technoArticle 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking technohoney690131
 
Make sure it is in APA 7 format and at least 3-4 paragraphs and refe.docx
Make sure it is in APA 7 format and at least 3-4 paragraphs and refe.docxMake sure it is in APA 7 format and at least 3-4 paragraphs and refe.docx
Make sure it is in APA 7 format and at least 3-4 paragraphs and refe.docxendawalling
 
Patient Privacy Protections
Patient Privacy ProtectionsPatient Privacy Protections
Patient Privacy Protectionskwittman
 
Meeting the Challenges of HIPAA Compliance, Phishing Attacks, and Mobile Secu...
Meeting the Challenges of HIPAA Compliance, Phishing Attacks, and Mobile Secu...Meeting the Challenges of HIPAA Compliance, Phishing Attacks, and Mobile Secu...
Meeting the Challenges of HIPAA Compliance, Phishing Attacks, and Mobile Secu...Envision Technology Advisors
 
2014 Data Breach Industry Forecast
2014 Data Breach Industry Forecast2014 Data Breach Industry Forecast
2014 Data Breach Industry Forecast- Mark - Fullbright
 

Similar to ONC Report Finds Privacy Risks From Non-HIPAA Data Collection (20)

Constructing a HIPAA-compliant healthcare app from scratch
 Constructing a HIPAA-compliant healthcare app from scratch Constructing a HIPAA-compliant healthcare app from scratch
Constructing a HIPAA-compliant healthcare app from scratch
 
Running head Information security threats 1Information secur.docx
Running head Information security threats 1Information secur.docxRunning head Information security threats 1Information secur.docx
Running head Information security threats 1Information secur.docx
 
Sarah Kim HIPAA for Small Providers
Sarah Kim HIPAA for Small ProvidersSarah Kim HIPAA for Small Providers
Sarah Kim HIPAA for Small Providers
 
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_CloudPerspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
 
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_CloudPerspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
 
HIPAA
HIPAAHIPAA
HIPAA
 
Nicolas Terry, "Big Data, Regulatory Disruption, and Arbitrage in Health Care"
Nicolas Terry, "Big Data, Regulatory Disruption, and Arbitrage in Health Care"Nicolas Terry, "Big Data, Regulatory Disruption, and Arbitrage in Health Care"
Nicolas Terry, "Big Data, Regulatory Disruption, and Arbitrage in Health Care"
 
Healthcare Information Technology Trends.docx
Healthcare Information Technology Trends.docxHealthcare Information Technology Trends.docx
Healthcare Information Technology Trends.docx
 
Information Governance in the Healthcare Industry
Information Governance in the Healthcare IndustryInformation Governance in the Healthcare Industry
Information Governance in the Healthcare Industry
 
Running Head Stage 2 Sharing Data1Stage 2 Sharing Data3.docx
Running Head Stage 2 Sharing Data1Stage 2 Sharing Data3.docxRunning Head Stage 2 Sharing Data1Stage 2 Sharing Data3.docx
Running Head Stage 2 Sharing Data1Stage 2 Sharing Data3.docx
 
Hipaa checklist for healthcare software
Hipaa checklist for healthcare softwareHipaa checklist for healthcare software
Hipaa checklist for healthcare software
 
HCAD_600_Paper1_Amer
HCAD_600_Paper1_AmerHCAD_600_Paper1_Amer
HCAD_600_Paper1_Amer
 
Hello Shreya,Detailed analysis of data breaches that occurred in
Hello Shreya,Detailed analysis of data breaches that occurred inHello Shreya,Detailed analysis of data breaches that occurred in
Hello Shreya,Detailed analysis of data breaches that occurred in
 
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECHInformation Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECH
 
POST EACH DISCUSSION SEPARATELYThe way patient data is harvested.docx
POST EACH DISCUSSION SEPARATELYThe way patient data is harvested.docxPOST EACH DISCUSSION SEPARATELYThe way patient data is harvested.docx
POST EACH DISCUSSION SEPARATELYThe way patient data is harvested.docx
 
Article 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking technoArticle 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking techno
 
Make sure it is in APA 7 format and at least 3-4 paragraphs and refe.docx
Make sure it is in APA 7 format and at least 3-4 paragraphs and refe.docxMake sure it is in APA 7 format and at least 3-4 paragraphs and refe.docx
Make sure it is in APA 7 format and at least 3-4 paragraphs and refe.docx
 
Patient Privacy Protections
Patient Privacy ProtectionsPatient Privacy Protections
Patient Privacy Protections
 
Meeting the Challenges of HIPAA Compliance, Phishing Attacks, and Mobile Secu...
Meeting the Challenges of HIPAA Compliance, Phishing Attacks, and Mobile Secu...Meeting the Challenges of HIPAA Compliance, Phishing Attacks, and Mobile Secu...
Meeting the Challenges of HIPAA Compliance, Phishing Attacks, and Mobile Secu...
 
2014 Data Breach Industry Forecast
2014 Data Breach Industry Forecast2014 Data Breach Industry Forecast
2014 Data Breach Industry Forecast
 

ONC Report Finds Privacy Risks From Non-HIPAA Data Collection

  • 1. ONC Report Describes Privacy and Security Gaps at Non-HIPAA Covered Entities [Study] Almost every individual on the Internet of Things (IOT) grid already has a copious amount of personal data that stem from things like the monitoring of exercise, glucose levels, and personal location and other movements, which are constantly added to the cloud on a daily basis. Even small amounts of this information, according to a 2013 FTC report, could be indiscriminately used to gain pricing advantages and also used to unfairly target certain demographic groups in advertising and marketing campaigns. So, it’s more important than ever to be aware of the number of ways that medical data can be used for inappropriate and unethical means in the marketplace. The oversight-gaps between HIPAA-covered entities that collect health data and those that are not regulated by HIPAA poses risks to individuals who share their information electronically. And these risks often outweigh the benefits of the virtual world and the Internet of Things. The recent FTC report on IOT and privacy issues shed light on the various other ways that information can potentially be compromised in the electronic age, with a lack of vigilance and due diligence. The use of multiple “smart devices” often makes life easier and saves the modern citizen a lot of valuable time and energy. But while it’s true that these “tools of convenience” bring with them many positives, the use of devices such as wearable fitness and medical bands, watches and monitors, home surveillance and security systems, appliance smart meters, and GPS and transponder boxes, are also data transmitters that can jeopardize the privacy concerns of HIPAA-related matters. Since there no regulatory policies in place for these smart devices, the Universityof Miami’s article from the Office of HIPAA Privacy and Security underscores some of these concerns and raises questions as to how consumers can combat the risks that come with the collection of enormous amounts of data stored by file and date sharing on sites such as Instagram, Google
  • 2. Drive and Microsoft OneDrive, DropBox, search engines queries, and the ubiquitous social media outlets. There is also the issue of how personal benefits can still compromise a much larger societal problem of increased risk/benefit concerns that comes with trying to improve health-care through data collection. Yes, consumers can take steps to maximize privacy settings on their personal devices, but that still doesn’t address what regulatory policies, if any, should be put into place to increase security measures for the user. HIPAA’s Electronic Data Interchange Rule (EDI) “strictly govern(s) the way data is electronically transferred from one computer to another,” and offers some hope for heightened data security, but is highly technical and requires sophisticated understanding, possibly even demanding the use of a consultant in some cases to achieve compliance with HIPAA standards. Although the aim of EDI is to lighten the data reporting load in the healthcare industry, there are still several factors that may determine whether or not you need to seek the advice of a consultant in order to meet compliance standards: concerns regarding the use of intermediaries for electronic claims versus a direct-pay method by the provider, and the overall acumen and sophistication of in-house IT departments. EPI stresses that as long as a provider is in compliance the methodology is discretionary when it comes to electronic transmission procedures. But it still remains a vitally important consideration for issues facing the healthcare industry’s privacy policies. A little over a month ago, the HIPAA Journal reported on another recent report issued by the ONC. The ONC concluded that the explosion of IOT has led to the collection of data by non- HIPAA entities not subject to the regulatory policies of HIPAA, thus compromising the health information of many individuals and placing them at risk for data theft and unwanted disclosures. The report also points to a need for better education policies to increase public awareness on what information is and is not protected under regulatory guidelines.
  • 3. Moreover, data from a non-HIPAA-entity may not even be available to the individual upon request, something that is an unquestionable right under HIPAA policies. And further, terms of use, data terminologies, rights of use, and information about collection and dissemination of limitations and third-party access are often vague, if not non-existent. Though the report stresses the progress made in these areas from efforts to inform private sectors of abuse, deception, and/or general malfeasance, the ONC still emphasizes the areas where individuals may not be protected, even under HIPAA, if they are lax in self-disclosure through such entities as social media platforms, or if they participate in self-pay boutique clinics for medical services that are not subject to HIPAA. But this leads to the larger point of a lack of public education policies which will ostensibly lead to a greater understanding of what does or does not apply to individuals who utilize the tremendous benefits of IOT. Marketers and advertisers may almost certainly balk at this. They’ll cry that it hinders their ability to develop and contribute more and more beneficial commodities for the overall public health issues and accompanying economic concerns over rising healthcare costs. But even those that cater to the industry may not fully understand the implications and ramifications of the long-term risks in healthcare and privacy issues that work from compliances with HIPAA regulations. The downside is that creativity and innovation may be thwarted for fear that industry regulatory policies are too cumbersome and tedious to conform to. It is clear that some kind of federal intervention needs to take place as technology continues to evolve. Because the study found that lack of encryption and the lack of other general security safeguards are currently the greatest threats to health information breaches, the ONC recommendation is to strive to increase awareness and understanding of appropriate policies (and the terms within), as well as greater restrictions regarding privacy-policy changes that
  • 4. occur in tandem with the consumer’s permission--not mere Internet data tracking methods without an informed consent. Resource Links: http://www.asha.org/practice/reimbursement/hipaa/hipaa_edi_faq/ http://www.hipaajournal.com/large-privacy-security-gaps-non-hipaa-covered- entities-onc-report-3512/ http://privacyoffice.med.miami.edu/awareness/tips/the-internet-of-things-and- privacy https://www.healthit.gov/sites/default/files/reports/info_blocking_040915.pdf https://www.ftc.gov/system/files/documents/reports/federal-trade-commission- staff-report-november-2013-workshop-entitled-internet-things- privacy/150127iotrpt.pdf https://www.healthit.gov/sites/default/files/non- covered_entities_report_june_17_2016.pdf Meta: Health data is being collected by entities not covered by HIPAA regulations and may be at risk—according to a recent report released by the ONR . Keywords: health data, healthcare data privacy, healthcare data security, healthcare information technology, ONR , HIPAA, non-HIPAA covered entities