SlideShare a Scribd company logo
HIPAA and De-Identification of PHI
Sometimes Required, Never Easy
Jim Sheldon-Dean
Director of Compliance Services
Lewis Creek Systems, LLC
www.lewiscreeksystems.com
1
© Copyright 2023 Lewis Creek Systems, LLC All Rights Reserved
jim@lewiscreeksystems.com www.lewiscreeksystems.com
Agenda
• The HIPAA Requirements for De-identification
• De-identification and its Rationale
• The De-identification Standard
• Preparation for De-identification
• Guidance on Satisfying the Expert Determination Method
• Who is an expert, and how do experts assess and mitigate the
risk of identification of an individual in health information
• Guidance on Satisfying the Safe Harbor Method
• What are examples of dates that are not permitted
• What constitutes "any other unique identifying number,
characteristic, or code”
• What is "actual knowledge that the remaining information could
be used either alone or in combination with other information to
identify an individual who is a subject of the information.”
• Q&A
2
© Copyright 2023 Lewis Creek Systems, LLC All Rights Reserved
jim@lewiscreeksystems.com www.lewiscreeksystems.com
HIPAA Privacy, Security, & Breach Rules
• Privacy Rule
– 45 CFR §164.5xx; Enforceable since 2003
– Establishes Rights of Individuals
– Controls on Uses and Disclosures
– Access of PHI is a hot button issue for HHS – FORTY-THREE settlements so far
recently in HHS OCR Right of Access initiative
• Security Rule
– 45 CFR §164.3xx; Enforceable since 2005
– Applies to all electronic PHI
– Flexible, customizable approach to health information security
– Uses Risk Analysis to identify and plan the mitigation of security risks
• Breach Notification Rule
– 45 CFR §164.4xx; Enforceable since February 2010
– Requires reporting of all PHI breaches to HHS and individuals
– Extensive/expensive obligations
– Provides examples of what not to do on the HHS “Wall of Shame”:
https://ocrportal.hhs.gov/ocr/breach/breach_report.jsf
3
© Copyright 2023 Lewis Creek Systems, LLC All Rights Reserved
jim@lewiscreeksystems.com www.lewiscreeksystems.com
PHI, Uses, and Disclosures
➢ Protected Health Information (PHI): Individually identifiable
information about health, health care or payment for
healthcare services; past, present, future; in any form or
format
➢ If PHI is truly de-identified it is no longer considered PHI but
that’s not easy to do properly
➢ Disclosure: the release, transfer, provision of, access to, or
divulging in any other manner of information outside the
entity holding the information
➢ Use: the sharing, employment, application, utilization,
examination, or analysis of individually identifiable health
information within an entity that maintains such information
4
© Copyright 2023 Lewis Creek Systems, LLC All Rights Reserved
jim@lewiscreeksystems.com www.lewiscreeksystems.com
Required & Permitted Uses & Disclosures
• MUST disclose:
– To HHS for compliance purposes
– To the individual (with limited exceptions)
• MAY use or disclose for:
– Treatment, Payment, and Healthcare Operations, with notice or in
emergencies
– Any purpose with an Authorization
– Directories, with opt-out
– For public good
– Subject to court orders
• Consider Minimum Necessary, except when requested by a
provider, the individual, or according to an Authorization
5
© Copyright 2023 Lewis Creek Systems, LLC All Rights Reserved
jim@lewiscreeksystems.com www.lewiscreeksystems.com
Allowable Disclosures, no permission needed
• Required by Law
• Public Health Activities
• Victims of Abuse, Neglect, or Domestic Violence
• Health Oversight
• Judicial and Administrative Proceedings
• Law Enforcement Activities
• Decedent Information, Organ Donation
• Research
• Serious Threat to Health or Safety
• Specialized Government Functions
• Worker’s Compensation
6
© Copyright 2023 Lewis Creek Systems, LLC All Rights Reserved
jim@lewiscreeksystems.com www.lewiscreeksystems.com
De-Identified Data:
The HIPAA Personal Identifiers
• Name
• Address including city and
zip code
• Telephone number
• Fax number
• E-mail address
• Social security number
• Date of birth
• Medical record number
• Health plan ID number
• Dates of treatment
• Account number
• Certificate/license number
• Device identifiers and serial number
• Vehicle identifiers and serial number
• URL
• IP address
• Biometric identifiers including finger
prints
• Full face photo and other
comparable image
• Or anything else that might be used
to identify the individual
7
© Copyright 2023 Lewis Creek Systems, LLC All Rights Reserved
jim@lewiscreeksystems.com www.lewiscreeksystems.com
Guidance on De-identification
• HHS’s guidance from 2012 on De-identification of PHI
http://www.hhs.gov/sites/default/files/ocr/privacy/hipaa/un
derstanding/coveredentities/De-
identification/hhs_deid_guidance.pdf
• NIST IR 8053, released December 17, 2015, a report on De-
Identification of Personal Information
http://nvlpubs.nist.gov/nistpubs/ir/2015/NIST.IR.8053.pdf
– Summarizes de-identification research
– Discusses current practices, including discussion of HIPAA
methods for de-identification, and the effectiveness of the HIPAA
Safe Harbor method
8
© Copyright 2023 Lewis Creek Systems, LLC All Rights Reserved
jim@lewiscreeksystems.com www.lewiscreeksystems.com
Two Methods of De-Identification
1. Remove all eighteen personal identifiers of subject,
relatives, employer, or household members; or
2. Biostatistician confirms that individual cannot be
identified.
• Verify data cannot be identified
• Small sample sets, unique data hard to de-identify
• De-Identified PHI is no longer PHI and need not be
protected or accounted for
9
© Copyright 2023 Lewis Creek Systems, LLC All Rights Reserved
jim@lewiscreeksystems.com www.lewiscreeksystems.com
De-identifying Photographs and Video
• Identifying data that was generated by the camera when a photo or
video was taken may be in embedded metadata in the image file
• Even if not in metadata, the circumstances and timing of the
appearance of photos and video, and the uniqueness of images can
identify the individuals
• When de-identifying, consider:
– The precision and accuracy of identifying objects requiring de-
identification
– The reversibility of the transformation – is it really, actually de-
identified? Or is the data still there?
– The visual quality of the resulting imagery
– The effectiveness of the chosen identity obscuring techniques in
actually obscuring identity
10
© Copyright 2023 Lewis Creek Systems, LLC All Rights Reserved
jim@lewiscreeksystems.com www.lewiscreeksystems.com
De-identification and Breaches
• Following HIPAA requirements for de-identified
data and Limited Data Sets limits breach exposure
• Securing the data limits breach exposure
• Require Protection and Prohibit re-identification of
data in data use agreements, for both:
– De-identified PHI
– Limited Data Sets
11
© Copyright 2023 Lewis Creek Systems, LLC All Rights Reserved
jim@lewiscreeksystems.com www.lewiscreeksystems.com
HIPAA Tiered Penalty Structure
12
© Copyright 2023 Lewis Creek Systems, LLC All Rights Reserved
jim@lewiscreeksystems.com www.lewiscreeksystems.com
• Tier 1: Did not know and, with reasonable diligence, would not have known
– $114 - $57,051 per violation, $28,525 annual max (may use an Affirmative
Defense)
• Tier 2: Violation due to reasonable cause and not willful neglect
– $1,141 - $57,051 per violation, $114,102 annual maximum (may get a Waiver)
• Willful Neglect: Conscious, intentional failure or reckless indifference to the
obligation to comply with the administrative simplification provision violated
• Tier 3: Violation due to willful neglect and corrected within 30 days of when
known or should have been known with reasonable diligence
– $11,182 - $57,051 per violation, $285,255 annual maximum
• Tier 4: Violation due to willful neglect and NOT corrected within 30 days of
when known or should have been known with reasonable diligence
– $57,051 per violation, $1,711, 533 annual maximum
• See the HHS OCR enforcement pages: http://www.hhs.gov/hipaa/for-
professionals/compliance-enforcement
13
Your to-do list…
✓ Review how you use and share PHI
✓ Look for invalid pseudonymization, such as using
patient initials as a name substitute
✓ For insecure communications, use a private code
✓ Call on a professional if you are not sure!
✓ Think through the context of information – where
did it come from and when?
✓ Verify that your procedures and processes are being
followed and actually work
✓ Be prepared for breaches, just in case
✓ Keep improving your processes and verification
© Copyright 2023 Lewis Creek Systems, LLC All Rights Reserved
jim@lewiscreeksystems.com www.lewiscreeksystems.com
Thank you!
Any Questions?
For additional information, please contact:
Jim Sheldon-Dean
Lewis Creek Systems, LLC
5675 Spear Street, Charlotte, VT 05445
jim@lewiscreeksystems.com
www.lewiscreeksystems.com
14
© Copyright 2023 Lewis Creek Systems, LLC All Rights Reserved
jim@lewiscreeksystems.com www.lewiscreeksystems.com
Register Now!!!

More Related Content

Similar to Safeguarding Personal Health Information: HIPAA Rules on De-Identification

Privacy law-update-whitmeyer-tuffin
Privacy law-update-whitmeyer-tuffinPrivacy law-update-whitmeyer-tuffin
Privacy law-update-whitmeyer-tuffin
WhitmeyerTuffin
 
Closing the Governance Gap - Enabling Governed Self-Service Analytics
Closing the Governance Gap  - Enabling Governed Self-Service AnalyticsClosing the Governance Gap  - Enabling Governed Self-Service Analytics
Closing the Governance Gap - Enabling Governed Self-Service Analytics
Privacera
 
HIPAA in the Public Cloud: The Rules Have Been Set - RightScale Compute 2013
HIPAA in the Public Cloud: The Rules Have Been Set - RightScale Compute 2013HIPAA in the Public Cloud: The Rules Have Been Set - RightScale Compute 2013
HIPAA in the Public Cloud: The Rules Have Been Set - RightScale Compute 2013
RightScale
 
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Diana Maier
 
Technology, policy, privacy and freedom
Technology, policy, privacy and freedomTechnology, policy, privacy and freedom
Technology, policy, privacy and freedom
G Prachi
 
Privacy and Data Security: Risk Management and Avoidance
Privacy and Data Security: Risk Management and AvoidancePrivacy and Data Security: Risk Management and Avoidance
Privacy and Data Security: Risk Management and AvoidanceAmy Purcell
 
HIPAA Compliant Cloud Computing, An Overview
HIPAA Compliant Cloud Computing, An OverviewHIPAA Compliant Cloud Computing, An Overview
HIPAA Compliant Cloud Computing, An Overview
ClearDATACloud
 
Texting and e mail with patients 2020
Texting and e mail with patients 2020Texting and e mail with patients 2020
Texting and e mail with patients 2020
RobertAByrdr
 
HIPAA and HITECH : What you need to know
HIPAA and HITECH : What you need to knowHIPAA and HITECH : What you need to know
HIPAA and HITECH : What you need to know
Shred-it
 
Hcc_hipaa hitech training_Basic www.hcctecnologies.com
Hcc_hipaa hitech training_Basic www.hcctecnologies.comHcc_hipaa hitech training_Basic www.hcctecnologies.com
Hcc_hipaa hitech training_Basic www.hcctecnologies.com
ejazmazhar
 
Hitech changes-to-hipaa
Hitech changes-to-hipaaHitech changes-to-hipaa
Hitech changes-to-hipaageeksikh
 
health insurance portability and accountability act.pptx
health insurance portability and accountability act.pptxhealth insurance portability and accountability act.pptx
health insurance portability and accountability act.pptx
amartya2087
 
When Past Performance May Be Indicative of Future Results - The Legal Implica...
When Past Performance May Be Indicative of Future Results - The Legal Implica...When Past Performance May Be Indicative of Future Results - The Legal Implica...
When Past Performance May Be Indicative of Future Results - The Legal Implica...
Jason Haislmaier
 
Patient confidentiality awareness training
Patient confidentiality awareness trainingPatient confidentiality awareness training
Patient confidentiality awareness trainingRichard Chaney
 
IT6701 Information Management Unit - V
IT6701 Information Management Unit - VIT6701 Information Management Unit - V
IT6701 Information Management Unit - V
pkaviya
 
CAHU EXPO Grove City, OH 2014
CAHU EXPO Grove City, OH 2014 CAHU EXPO Grove City, OH 2014
CAHU EXPO Grove City, OH 2014
Jason Karn
 
Patient confidentiality awareness training
Patient confidentiality awareness trainingPatient confidentiality awareness training
Patient confidentiality awareness trainingRichard Chaney
 
Marlene brooks week 1 discussion 2 - confidentiality
Marlene brooks   week 1 discussion 2 - confidentialityMarlene brooks   week 1 discussion 2 - confidentiality
Marlene brooks week 1 discussion 2 - confidentialitybablot33
 

Similar to Safeguarding Personal Health Information: HIPAA Rules on De-Identification (20)

Privacy law-update-whitmeyer-tuffin
Privacy law-update-whitmeyer-tuffinPrivacy law-update-whitmeyer-tuffin
Privacy law-update-whitmeyer-tuffin
 
Closing the Governance Gap - Enabling Governed Self-Service Analytics
Closing the Governance Gap  - Enabling Governed Self-Service AnalyticsClosing the Governance Gap  - Enabling Governed Self-Service Analytics
Closing the Governance Gap - Enabling Governed Self-Service Analytics
 
HIPAA in the Public Cloud: The Rules Have Been Set - RightScale Compute 2013
HIPAA in the Public Cloud: The Rules Have Been Set - RightScale Compute 2013HIPAA in the Public Cloud: The Rules Have Been Set - RightScale Compute 2013
HIPAA in the Public Cloud: The Rules Have Been Set - RightScale Compute 2013
 
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
 
Technology, policy, privacy and freedom
Technology, policy, privacy and freedomTechnology, policy, privacy and freedom
Technology, policy, privacy and freedom
 
Privacy and Data Security: Risk Management and Avoidance
Privacy and Data Security: Risk Management and AvoidancePrivacy and Data Security: Risk Management and Avoidance
Privacy and Data Security: Risk Management and Avoidance
 
HIPAA Compliant Cloud Computing, An Overview
HIPAA Compliant Cloud Computing, An OverviewHIPAA Compliant Cloud Computing, An Overview
HIPAA Compliant Cloud Computing, An Overview
 
Data Management Protection Acts
Data Management Protection ActsData Management Protection Acts
Data Management Protection Acts
 
Texting and e mail with patients 2020
Texting and e mail with patients 2020Texting and e mail with patients 2020
Texting and e mail with patients 2020
 
HIPAA
HIPAAHIPAA
HIPAA
 
HIPAA and HITECH : What you need to know
HIPAA and HITECH : What you need to knowHIPAA and HITECH : What you need to know
HIPAA and HITECH : What you need to know
 
Hcc_hipaa hitech training_Basic www.hcctecnologies.com
Hcc_hipaa hitech training_Basic www.hcctecnologies.comHcc_hipaa hitech training_Basic www.hcctecnologies.com
Hcc_hipaa hitech training_Basic www.hcctecnologies.com
 
Hitech changes-to-hipaa
Hitech changes-to-hipaaHitech changes-to-hipaa
Hitech changes-to-hipaa
 
health insurance portability and accountability act.pptx
health insurance portability and accountability act.pptxhealth insurance portability and accountability act.pptx
health insurance portability and accountability act.pptx
 
When Past Performance May Be Indicative of Future Results - The Legal Implica...
When Past Performance May Be Indicative of Future Results - The Legal Implica...When Past Performance May Be Indicative of Future Results - The Legal Implica...
When Past Performance May Be Indicative of Future Results - The Legal Implica...
 
Patient confidentiality awareness training
Patient confidentiality awareness trainingPatient confidentiality awareness training
Patient confidentiality awareness training
 
IT6701 Information Management Unit - V
IT6701 Information Management Unit - VIT6701 Information Management Unit - V
IT6701 Information Management Unit - V
 
CAHU EXPO Grove City, OH 2014
CAHU EXPO Grove City, OH 2014 CAHU EXPO Grove City, OH 2014
CAHU EXPO Grove City, OH 2014
 
Patient confidentiality awareness training
Patient confidentiality awareness trainingPatient confidentiality awareness training
Patient confidentiality awareness training
 
Marlene brooks week 1 discussion 2 - confidentiality
Marlene brooks   week 1 discussion 2 - confidentialityMarlene brooks   week 1 discussion 2 - confidentiality
Marlene brooks week 1 discussion 2 - confidentiality
 

More from Conference Panel

2024 HIPAA Compliance Training Guide to the Compliance Officers
2024 HIPAA Compliance Training Guide to the Compliance Officers2024 HIPAA Compliance Training Guide to the Compliance Officers
2024 HIPAA Compliance Training Guide to the Compliance Officers
Conference Panel
 
Medicare and Medicaid Managed Care Enrollments in 2024
Medicare and Medicaid Managed Care Enrollments in 2024Medicare and Medicaid Managed Care Enrollments in 2024
Medicare and Medicaid Managed Care Enrollments in 2024
Conference Panel
 
Dispelling HIPAA Myths: Texting, Emailing, and BYOD Best Practices
Dispelling HIPAA Myths: Texting, Emailing, and BYOD Best PracticesDispelling HIPAA Myths: Texting, Emailing, and BYOD Best Practices
Dispelling HIPAA Myths: Texting, Emailing, and BYOD Best Practices
Conference Panel
 
Medical Record Chapter: Meeting the CMS Hospital CoPs and Access Requirements
Medical Record Chapter: Meeting the CMS Hospital CoPs and Access RequirementsMedical Record Chapter: Meeting the CMS Hospital CoPs and Access Requirements
Medical Record Chapter: Meeting the CMS Hospital CoPs and Access Requirements
Conference Panel
 
Grievances and Complaints 2024 Compliance with the CMS CoPs, Joint Commission...
Grievances and Complaints 2024 Compliance with the CMS CoPs, Joint Commission...Grievances and Complaints 2024 Compliance with the CMS CoPs, Joint Commission...
Grievances and Complaints 2024 Compliance with the CMS CoPs, Joint Commission...
Conference Panel
 
The 2024 Prior Authorization Process For Medical Providers
The 2024 Prior Authorization Process For Medical ProvidersThe 2024 Prior Authorization Process For Medical Providers
The 2024 Prior Authorization Process For Medical Providers
Conference Panel
 
Protecting Patient Privacy: Navigating HIPAA in Digital Landscapes
Protecting Patient Privacy: Navigating HIPAA in Digital LandscapesProtecting Patient Privacy: Navigating HIPAA in Digital Landscapes
Protecting Patient Privacy: Navigating HIPAA in Digital Landscapes
Conference Panel
 
HIPAA Guidelines and Electronic Communication: What Healthcare Professionals ...
HIPAA Guidelines and Electronic Communication: What Healthcare Professionals ...HIPAA Guidelines and Electronic Communication: What Healthcare Professionals ...
HIPAA Guidelines and Electronic Communication: What Healthcare Professionals ...
Conference Panel
 
Nursing Standards in Hospital Accreditation: CMS Guidelines 2024
Nursing Standards in Hospital Accreditation: CMS Guidelines 2024Nursing Standards in Hospital Accreditation: CMS Guidelines 2024
Nursing Standards in Hospital Accreditation: CMS Guidelines 2024
Conference Panel
 
Implementing CMS Hospital QAPI Guidelines for 2024
Implementing CMS Hospital QAPI Guidelines for 2024Implementing CMS Hospital QAPI Guidelines for 2024
Implementing CMS Hospital QAPI Guidelines for 2024
Conference Panel
 
Exploring the Revised Medicare 855 Enrollment Form for 2024
Exploring the Revised Medicare 855 Enrollment Form for 2024Exploring the Revised Medicare 855 Enrollment Form for 2024
Exploring the Revised Medicare 855 Enrollment Form for 2024
Conference Panel
 
Demystifying Shared Care and "Incident To" Billing: 2024 Updates
Demystifying Shared Care and "Incident To" Billing: 2024 UpdatesDemystifying Shared Care and "Incident To" Billing: 2024 Updates
Demystifying Shared Care and "Incident To" Billing: 2024 Updates
Conference Panel
 
Understanding CPT Code Revisions in 2024
Understanding CPT Code Revisions in 2024Understanding CPT Code Revisions in 2024
Understanding CPT Code Revisions in 2024
Conference Panel
 
Breaking Down the Latest HIPAA Modifications: What's New in 2024 and Beyond
Breaking Down the Latest HIPAA Modifications: What's New in 2024 and BeyondBreaking Down the Latest HIPAA Modifications: What's New in 2024 and Beyond
Breaking Down the Latest HIPAA Modifications: What's New in 2024 and Beyond
Conference Panel
 
Decoding the Latest Changes in the 2024 Medicare Physician Fee Schedule (MPFS...
Decoding the Latest Changes in the 2024 Medicare Physician Fee Schedule (MPFS...Decoding the Latest Changes in the 2024 Medicare Physician Fee Schedule (MPFS...
Decoding the Latest Changes in the 2024 Medicare Physician Fee Schedule (MPFS...
Conference Panel
 
Provider Enrollment Excellence: A Strategic Program Guide
Provider Enrollment Excellence: A Strategic Program GuideProvider Enrollment Excellence: A Strategic Program Guide
Provider Enrollment Excellence: A Strategic Program Guide
Conference Panel
 
What Physicians Need to Know: CMS Final Rules 2024
What Physicians Need to Know: CMS Final Rules 2024What Physicians Need to Know: CMS Final Rules 2024
What Physicians Need to Know: CMS Final Rules 2024
Conference Panel
 
A Deep Dive into 2023: Hospital CoPs and Best Practices for History and Physi...
A Deep Dive into 2023: Hospital CoPs and Best Practices for History and Physi...A Deep Dive into 2023: Hospital CoPs and Best Practices for History and Physi...
A Deep Dive into 2023: Hospital CoPs and Best Practices for History and Physi...
Conference Panel
 
Demystifying the 2024 OIG Audit Selection Criteria
Demystifying the 2024 OIG Audit Selection CriteriaDemystifying the 2024 OIG Audit Selection Criteria
Demystifying the 2024 OIG Audit Selection Criteria
Conference Panel
 
Medicare Preventive Care: A CMS Perspective
Medicare Preventive Care: A CMS PerspectiveMedicare Preventive Care: A CMS Perspective
Medicare Preventive Care: A CMS Perspective
Conference Panel
 

More from Conference Panel (20)

2024 HIPAA Compliance Training Guide to the Compliance Officers
2024 HIPAA Compliance Training Guide to the Compliance Officers2024 HIPAA Compliance Training Guide to the Compliance Officers
2024 HIPAA Compliance Training Guide to the Compliance Officers
 
Medicare and Medicaid Managed Care Enrollments in 2024
Medicare and Medicaid Managed Care Enrollments in 2024Medicare and Medicaid Managed Care Enrollments in 2024
Medicare and Medicaid Managed Care Enrollments in 2024
 
Dispelling HIPAA Myths: Texting, Emailing, and BYOD Best Practices
Dispelling HIPAA Myths: Texting, Emailing, and BYOD Best PracticesDispelling HIPAA Myths: Texting, Emailing, and BYOD Best Practices
Dispelling HIPAA Myths: Texting, Emailing, and BYOD Best Practices
 
Medical Record Chapter: Meeting the CMS Hospital CoPs and Access Requirements
Medical Record Chapter: Meeting the CMS Hospital CoPs and Access RequirementsMedical Record Chapter: Meeting the CMS Hospital CoPs and Access Requirements
Medical Record Chapter: Meeting the CMS Hospital CoPs and Access Requirements
 
Grievances and Complaints 2024 Compliance with the CMS CoPs, Joint Commission...
Grievances and Complaints 2024 Compliance with the CMS CoPs, Joint Commission...Grievances and Complaints 2024 Compliance with the CMS CoPs, Joint Commission...
Grievances and Complaints 2024 Compliance with the CMS CoPs, Joint Commission...
 
The 2024 Prior Authorization Process For Medical Providers
The 2024 Prior Authorization Process For Medical ProvidersThe 2024 Prior Authorization Process For Medical Providers
The 2024 Prior Authorization Process For Medical Providers
 
Protecting Patient Privacy: Navigating HIPAA in Digital Landscapes
Protecting Patient Privacy: Navigating HIPAA in Digital LandscapesProtecting Patient Privacy: Navigating HIPAA in Digital Landscapes
Protecting Patient Privacy: Navigating HIPAA in Digital Landscapes
 
HIPAA Guidelines and Electronic Communication: What Healthcare Professionals ...
HIPAA Guidelines and Electronic Communication: What Healthcare Professionals ...HIPAA Guidelines and Electronic Communication: What Healthcare Professionals ...
HIPAA Guidelines and Electronic Communication: What Healthcare Professionals ...
 
Nursing Standards in Hospital Accreditation: CMS Guidelines 2024
Nursing Standards in Hospital Accreditation: CMS Guidelines 2024Nursing Standards in Hospital Accreditation: CMS Guidelines 2024
Nursing Standards in Hospital Accreditation: CMS Guidelines 2024
 
Implementing CMS Hospital QAPI Guidelines for 2024
Implementing CMS Hospital QAPI Guidelines for 2024Implementing CMS Hospital QAPI Guidelines for 2024
Implementing CMS Hospital QAPI Guidelines for 2024
 
Exploring the Revised Medicare 855 Enrollment Form for 2024
Exploring the Revised Medicare 855 Enrollment Form for 2024Exploring the Revised Medicare 855 Enrollment Form for 2024
Exploring the Revised Medicare 855 Enrollment Form for 2024
 
Demystifying Shared Care and "Incident To" Billing: 2024 Updates
Demystifying Shared Care and "Incident To" Billing: 2024 UpdatesDemystifying Shared Care and "Incident To" Billing: 2024 Updates
Demystifying Shared Care and "Incident To" Billing: 2024 Updates
 
Understanding CPT Code Revisions in 2024
Understanding CPT Code Revisions in 2024Understanding CPT Code Revisions in 2024
Understanding CPT Code Revisions in 2024
 
Breaking Down the Latest HIPAA Modifications: What's New in 2024 and Beyond
Breaking Down the Latest HIPAA Modifications: What's New in 2024 and BeyondBreaking Down the Latest HIPAA Modifications: What's New in 2024 and Beyond
Breaking Down the Latest HIPAA Modifications: What's New in 2024 and Beyond
 
Decoding the Latest Changes in the 2024 Medicare Physician Fee Schedule (MPFS...
Decoding the Latest Changes in the 2024 Medicare Physician Fee Schedule (MPFS...Decoding the Latest Changes in the 2024 Medicare Physician Fee Schedule (MPFS...
Decoding the Latest Changes in the 2024 Medicare Physician Fee Schedule (MPFS...
 
Provider Enrollment Excellence: A Strategic Program Guide
Provider Enrollment Excellence: A Strategic Program GuideProvider Enrollment Excellence: A Strategic Program Guide
Provider Enrollment Excellence: A Strategic Program Guide
 
What Physicians Need to Know: CMS Final Rules 2024
What Physicians Need to Know: CMS Final Rules 2024What Physicians Need to Know: CMS Final Rules 2024
What Physicians Need to Know: CMS Final Rules 2024
 
A Deep Dive into 2023: Hospital CoPs and Best Practices for History and Physi...
A Deep Dive into 2023: Hospital CoPs and Best Practices for History and Physi...A Deep Dive into 2023: Hospital CoPs and Best Practices for History and Physi...
A Deep Dive into 2023: Hospital CoPs and Best Practices for History and Physi...
 
Demystifying the 2024 OIG Audit Selection Criteria
Demystifying the 2024 OIG Audit Selection CriteriaDemystifying the 2024 OIG Audit Selection Criteria
Demystifying the 2024 OIG Audit Selection Criteria
 
Medicare Preventive Care: A CMS Perspective
Medicare Preventive Care: A CMS PerspectiveMedicare Preventive Care: A CMS Perspective
Medicare Preventive Care: A CMS Perspective
 

Recently uploaded

Under Pressure : Kenneth Kruk's Strategy
Under Pressure : Kenneth Kruk's StrategyUnder Pressure : Kenneth Kruk's Strategy
Under Pressure : Kenneth Kruk's Strategy
Kenneth Kruk
 
LGBTQ+ Adults: Unique Opportunities and Inclusive Approaches to Care
LGBTQ+ Adults: Unique Opportunities and Inclusive Approaches to CareLGBTQ+ Adults: Unique Opportunities and Inclusive Approaches to Care
LGBTQ+ Adults: Unique Opportunities and Inclusive Approaches to Care
VITASAuthor
 
RECENT ADVANCES IN BREAST CANCER RADIOTHERAPY
RECENT ADVANCES IN BREAST CANCER RADIOTHERAPYRECENT ADVANCES IN BREAST CANCER RADIOTHERAPY
RECENT ADVANCES IN BREAST CANCER RADIOTHERAPY
Isha Jaiswal
 
Bringing AI into a Mid-Sized Company: A structured Approach
Bringing AI into a Mid-Sized Company: A structured ApproachBringing AI into a Mid-Sized Company: A structured Approach
Bringing AI into a Mid-Sized Company: A structured Approach
Brian Frerichs
 
Cardiac Arrhythmias (2).pdf for nursing student
Cardiac Arrhythmias (2).pdf for nursing studentCardiac Arrhythmias (2).pdf for nursing student
Cardiac Arrhythmias (2).pdf for nursing student
fahmyahmed789
 
DRAFT Ventilator Rapid Reference version 2.4.pdf
DRAFT Ventilator Rapid Reference  version  2.4.pdfDRAFT Ventilator Rapid Reference  version  2.4.pdf
DRAFT Ventilator Rapid Reference version 2.4.pdf
Robert Cole
 
CANSA support - Caring for Cancer Patients' Caregivers
CANSA support - Caring for Cancer Patients' CaregiversCANSA support - Caring for Cancer Patients' Caregivers
CANSA support - Caring for Cancer Patients' Caregivers
CANSA The Cancer Association of South Africa
 
Rate Controlled Drug Delivery Systems.pdf
Rate Controlled Drug Delivery Systems.pdfRate Controlled Drug Delivery Systems.pdf
Rate Controlled Drug Delivery Systems.pdf
Rajarambapu College of Pharmacy Kasegaon Dist Sangli
 
The positive impact of SGRT – The Berkshire Cancer Centre experience
The positive impact of SGRT – The Berkshire Cancer Centre experienceThe positive impact of SGRT – The Berkshire Cancer Centre experience
The positive impact of SGRT – The Berkshire Cancer Centre experience
SGRT Community
 
Trauma Outpatient Center .
Trauma Outpatient Center                       .Trauma Outpatient Center                       .
Trauma Outpatient Center .
TraumaOutpatientCent
 
One Gene One Enzyme Theory.pptxvhvhfhfhfhf
One Gene One Enzyme Theory.pptxvhvhfhfhfhfOne Gene One Enzyme Theory.pptxvhvhfhfhfhf
One Gene One Enzyme Theory.pptxvhvhfhfhfhf
AbdulMunim54
 
TEST BANK For Accounting Information Systems, 3rd Edition by Vernon Richardso...
TEST BANK For Accounting Information Systems, 3rd Edition by Vernon Richardso...TEST BANK For Accounting Information Systems, 3rd Edition by Vernon Richardso...
TEST BANK For Accounting Information Systems, 3rd Edition by Vernon Richardso...
rightmanforbloodline
 
CCSN_June_06 2024_jones. Cancer Rehabpptx
CCSN_June_06 2024_jones. Cancer RehabpptxCCSN_June_06 2024_jones. Cancer Rehabpptx
CCSN_June_06 2024_jones. Cancer Rehabpptx
Canadian Cancer Survivor Network
 
Deep Leg Vein Thrombosis (DVT): Meaning, Causes, Symptoms, Treatment, and Mor...
Deep Leg Vein Thrombosis (DVT): Meaning, Causes, Symptoms, Treatment, and Mor...Deep Leg Vein Thrombosis (DVT): Meaning, Causes, Symptoms, Treatment, and Mor...
Deep Leg Vein Thrombosis (DVT): Meaning, Causes, Symptoms, Treatment, and Mor...
The Lifesciences Magazine
 
Dr. David Greene R3 stem cell Breakthroughs: Stem Cell Therapy in Cardiology
Dr. David Greene R3 stem cell Breakthroughs: Stem Cell Therapy in CardiologyDr. David Greene R3 stem cell Breakthroughs: Stem Cell Therapy in Cardiology
Dr. David Greene R3 stem cell Breakthroughs: Stem Cell Therapy in Cardiology
R3 Stem Cell
 
How Effective is Homeopathic Medicine for Anxiety and Stress Relief.pdf
How Effective is Homeopathic Medicine for Anxiety and Stress Relief.pdfHow Effective is Homeopathic Medicine for Anxiety and Stress Relief.pdf
How Effective is Homeopathic Medicine for Anxiety and Stress Relief.pdf
Dharma Homoeopathy
 
DELIRIUM BY DR JAGMOHAN PRAJAPATI.......
DELIRIUM BY DR JAGMOHAN PRAJAPATI.......DELIRIUM BY DR JAGMOHAN PRAJAPATI.......
DELIRIUM BY DR JAGMOHAN PRAJAPATI.......
DR Jag Mohan Prajapati
 
CMHPSM Regional Compliance Training 2024
CMHPSM Regional Compliance Training 2024CMHPSM Regional Compliance Training 2024
CMHPSM Regional Compliance Training 2024
JColaianne
 
定制(wsu毕业证书)美国华盛顿州立大学毕业证学位证书实拍图原版一模一样
定制(wsu毕业证书)美国华盛顿州立大学毕业证学位证书实拍图原版一模一样定制(wsu毕业证书)美国华盛顿州立大学毕业证学位证书实拍图原版一模一样
定制(wsu毕业证书)美国华盛顿州立大学毕业证学位证书实拍图原版一模一样
khvdq584
 
NKTI Annual Report - Annual Report FY 2022
NKTI Annual Report - Annual Report FY 2022NKTI Annual Report - Annual Report FY 2022
NKTI Annual Report - Annual Report FY 2022
nktiacc3
 

Recently uploaded (20)

Under Pressure : Kenneth Kruk's Strategy
Under Pressure : Kenneth Kruk's StrategyUnder Pressure : Kenneth Kruk's Strategy
Under Pressure : Kenneth Kruk's Strategy
 
LGBTQ+ Adults: Unique Opportunities and Inclusive Approaches to Care
LGBTQ+ Adults: Unique Opportunities and Inclusive Approaches to CareLGBTQ+ Adults: Unique Opportunities and Inclusive Approaches to Care
LGBTQ+ Adults: Unique Opportunities and Inclusive Approaches to Care
 
RECENT ADVANCES IN BREAST CANCER RADIOTHERAPY
RECENT ADVANCES IN BREAST CANCER RADIOTHERAPYRECENT ADVANCES IN BREAST CANCER RADIOTHERAPY
RECENT ADVANCES IN BREAST CANCER RADIOTHERAPY
 
Bringing AI into a Mid-Sized Company: A structured Approach
Bringing AI into a Mid-Sized Company: A structured ApproachBringing AI into a Mid-Sized Company: A structured Approach
Bringing AI into a Mid-Sized Company: A structured Approach
 
Cardiac Arrhythmias (2).pdf for nursing student
Cardiac Arrhythmias (2).pdf for nursing studentCardiac Arrhythmias (2).pdf for nursing student
Cardiac Arrhythmias (2).pdf for nursing student
 
DRAFT Ventilator Rapid Reference version 2.4.pdf
DRAFT Ventilator Rapid Reference  version  2.4.pdfDRAFT Ventilator Rapid Reference  version  2.4.pdf
DRAFT Ventilator Rapid Reference version 2.4.pdf
 
CANSA support - Caring for Cancer Patients' Caregivers
CANSA support - Caring for Cancer Patients' CaregiversCANSA support - Caring for Cancer Patients' Caregivers
CANSA support - Caring for Cancer Patients' Caregivers
 
Rate Controlled Drug Delivery Systems.pdf
Rate Controlled Drug Delivery Systems.pdfRate Controlled Drug Delivery Systems.pdf
Rate Controlled Drug Delivery Systems.pdf
 
The positive impact of SGRT – The Berkshire Cancer Centre experience
The positive impact of SGRT – The Berkshire Cancer Centre experienceThe positive impact of SGRT – The Berkshire Cancer Centre experience
The positive impact of SGRT – The Berkshire Cancer Centre experience
 
Trauma Outpatient Center .
Trauma Outpatient Center                       .Trauma Outpatient Center                       .
Trauma Outpatient Center .
 
One Gene One Enzyme Theory.pptxvhvhfhfhfhf
One Gene One Enzyme Theory.pptxvhvhfhfhfhfOne Gene One Enzyme Theory.pptxvhvhfhfhfhf
One Gene One Enzyme Theory.pptxvhvhfhfhfhf
 
TEST BANK For Accounting Information Systems, 3rd Edition by Vernon Richardso...
TEST BANK For Accounting Information Systems, 3rd Edition by Vernon Richardso...TEST BANK For Accounting Information Systems, 3rd Edition by Vernon Richardso...
TEST BANK For Accounting Information Systems, 3rd Edition by Vernon Richardso...
 
CCSN_June_06 2024_jones. Cancer Rehabpptx
CCSN_June_06 2024_jones. Cancer RehabpptxCCSN_June_06 2024_jones. Cancer Rehabpptx
CCSN_June_06 2024_jones. Cancer Rehabpptx
 
Deep Leg Vein Thrombosis (DVT): Meaning, Causes, Symptoms, Treatment, and Mor...
Deep Leg Vein Thrombosis (DVT): Meaning, Causes, Symptoms, Treatment, and Mor...Deep Leg Vein Thrombosis (DVT): Meaning, Causes, Symptoms, Treatment, and Mor...
Deep Leg Vein Thrombosis (DVT): Meaning, Causes, Symptoms, Treatment, and Mor...
 
Dr. David Greene R3 stem cell Breakthroughs: Stem Cell Therapy in Cardiology
Dr. David Greene R3 stem cell Breakthroughs: Stem Cell Therapy in CardiologyDr. David Greene R3 stem cell Breakthroughs: Stem Cell Therapy in Cardiology
Dr. David Greene R3 stem cell Breakthroughs: Stem Cell Therapy in Cardiology
 
How Effective is Homeopathic Medicine for Anxiety and Stress Relief.pdf
How Effective is Homeopathic Medicine for Anxiety and Stress Relief.pdfHow Effective is Homeopathic Medicine for Anxiety and Stress Relief.pdf
How Effective is Homeopathic Medicine for Anxiety and Stress Relief.pdf
 
DELIRIUM BY DR JAGMOHAN PRAJAPATI.......
DELIRIUM BY DR JAGMOHAN PRAJAPATI.......DELIRIUM BY DR JAGMOHAN PRAJAPATI.......
DELIRIUM BY DR JAGMOHAN PRAJAPATI.......
 
CMHPSM Regional Compliance Training 2024
CMHPSM Regional Compliance Training 2024CMHPSM Regional Compliance Training 2024
CMHPSM Regional Compliance Training 2024
 
定制(wsu毕业证书)美国华盛顿州立大学毕业证学位证书实拍图原版一模一样
定制(wsu毕业证书)美国华盛顿州立大学毕业证学位证书实拍图原版一模一样定制(wsu毕业证书)美国华盛顿州立大学毕业证学位证书实拍图原版一模一样
定制(wsu毕业证书)美国华盛顿州立大学毕业证学位证书实拍图原版一模一样
 
NKTI Annual Report - Annual Report FY 2022
NKTI Annual Report - Annual Report FY 2022NKTI Annual Report - Annual Report FY 2022
NKTI Annual Report - Annual Report FY 2022
 

Safeguarding Personal Health Information: HIPAA Rules on De-Identification

  • 1. HIPAA and De-Identification of PHI Sometimes Required, Never Easy Jim Sheldon-Dean Director of Compliance Services Lewis Creek Systems, LLC www.lewiscreeksystems.com 1 © Copyright 2023 Lewis Creek Systems, LLC All Rights Reserved jim@lewiscreeksystems.com www.lewiscreeksystems.com
  • 2. Agenda • The HIPAA Requirements for De-identification • De-identification and its Rationale • The De-identification Standard • Preparation for De-identification • Guidance on Satisfying the Expert Determination Method • Who is an expert, and how do experts assess and mitigate the risk of identification of an individual in health information • Guidance on Satisfying the Safe Harbor Method • What are examples of dates that are not permitted • What constitutes "any other unique identifying number, characteristic, or code” • What is "actual knowledge that the remaining information could be used either alone or in combination with other information to identify an individual who is a subject of the information.” • Q&A 2 © Copyright 2023 Lewis Creek Systems, LLC All Rights Reserved jim@lewiscreeksystems.com www.lewiscreeksystems.com
  • 3. HIPAA Privacy, Security, & Breach Rules • Privacy Rule – 45 CFR §164.5xx; Enforceable since 2003 – Establishes Rights of Individuals – Controls on Uses and Disclosures – Access of PHI is a hot button issue for HHS – FORTY-THREE settlements so far recently in HHS OCR Right of Access initiative • Security Rule – 45 CFR §164.3xx; Enforceable since 2005 – Applies to all electronic PHI – Flexible, customizable approach to health information security – Uses Risk Analysis to identify and plan the mitigation of security risks • Breach Notification Rule – 45 CFR §164.4xx; Enforceable since February 2010 – Requires reporting of all PHI breaches to HHS and individuals – Extensive/expensive obligations – Provides examples of what not to do on the HHS “Wall of Shame”: https://ocrportal.hhs.gov/ocr/breach/breach_report.jsf 3 © Copyright 2023 Lewis Creek Systems, LLC All Rights Reserved jim@lewiscreeksystems.com www.lewiscreeksystems.com
  • 4. PHI, Uses, and Disclosures ➢ Protected Health Information (PHI): Individually identifiable information about health, health care or payment for healthcare services; past, present, future; in any form or format ➢ If PHI is truly de-identified it is no longer considered PHI but that’s not easy to do properly ➢ Disclosure: the release, transfer, provision of, access to, or divulging in any other manner of information outside the entity holding the information ➢ Use: the sharing, employment, application, utilization, examination, or analysis of individually identifiable health information within an entity that maintains such information 4 © Copyright 2023 Lewis Creek Systems, LLC All Rights Reserved jim@lewiscreeksystems.com www.lewiscreeksystems.com
  • 5. Required & Permitted Uses & Disclosures • MUST disclose: – To HHS for compliance purposes – To the individual (with limited exceptions) • MAY use or disclose for: – Treatment, Payment, and Healthcare Operations, with notice or in emergencies – Any purpose with an Authorization – Directories, with opt-out – For public good – Subject to court orders • Consider Minimum Necessary, except when requested by a provider, the individual, or according to an Authorization 5 © Copyright 2023 Lewis Creek Systems, LLC All Rights Reserved jim@lewiscreeksystems.com www.lewiscreeksystems.com
  • 6. Allowable Disclosures, no permission needed • Required by Law • Public Health Activities • Victims of Abuse, Neglect, or Domestic Violence • Health Oversight • Judicial and Administrative Proceedings • Law Enforcement Activities • Decedent Information, Organ Donation • Research • Serious Threat to Health or Safety • Specialized Government Functions • Worker’s Compensation 6 © Copyright 2023 Lewis Creek Systems, LLC All Rights Reserved jim@lewiscreeksystems.com www.lewiscreeksystems.com
  • 7. De-Identified Data: The HIPAA Personal Identifiers • Name • Address including city and zip code • Telephone number • Fax number • E-mail address • Social security number • Date of birth • Medical record number • Health plan ID number • Dates of treatment • Account number • Certificate/license number • Device identifiers and serial number • Vehicle identifiers and serial number • URL • IP address • Biometric identifiers including finger prints • Full face photo and other comparable image • Or anything else that might be used to identify the individual 7 © Copyright 2023 Lewis Creek Systems, LLC All Rights Reserved jim@lewiscreeksystems.com www.lewiscreeksystems.com
  • 8. Guidance on De-identification • HHS’s guidance from 2012 on De-identification of PHI http://www.hhs.gov/sites/default/files/ocr/privacy/hipaa/un derstanding/coveredentities/De- identification/hhs_deid_guidance.pdf • NIST IR 8053, released December 17, 2015, a report on De- Identification of Personal Information http://nvlpubs.nist.gov/nistpubs/ir/2015/NIST.IR.8053.pdf – Summarizes de-identification research – Discusses current practices, including discussion of HIPAA methods for de-identification, and the effectiveness of the HIPAA Safe Harbor method 8 © Copyright 2023 Lewis Creek Systems, LLC All Rights Reserved jim@lewiscreeksystems.com www.lewiscreeksystems.com
  • 9. Two Methods of De-Identification 1. Remove all eighteen personal identifiers of subject, relatives, employer, or household members; or 2. Biostatistician confirms that individual cannot be identified. • Verify data cannot be identified • Small sample sets, unique data hard to de-identify • De-Identified PHI is no longer PHI and need not be protected or accounted for 9 © Copyright 2023 Lewis Creek Systems, LLC All Rights Reserved jim@lewiscreeksystems.com www.lewiscreeksystems.com
  • 10. De-identifying Photographs and Video • Identifying data that was generated by the camera when a photo or video was taken may be in embedded metadata in the image file • Even if not in metadata, the circumstances and timing of the appearance of photos and video, and the uniqueness of images can identify the individuals • When de-identifying, consider: – The precision and accuracy of identifying objects requiring de- identification – The reversibility of the transformation – is it really, actually de- identified? Or is the data still there? – The visual quality of the resulting imagery – The effectiveness of the chosen identity obscuring techniques in actually obscuring identity 10 © Copyright 2023 Lewis Creek Systems, LLC All Rights Reserved jim@lewiscreeksystems.com www.lewiscreeksystems.com
  • 11. De-identification and Breaches • Following HIPAA requirements for de-identified data and Limited Data Sets limits breach exposure • Securing the data limits breach exposure • Require Protection and Prohibit re-identification of data in data use agreements, for both: – De-identified PHI – Limited Data Sets 11 © Copyright 2023 Lewis Creek Systems, LLC All Rights Reserved jim@lewiscreeksystems.com www.lewiscreeksystems.com
  • 12. HIPAA Tiered Penalty Structure 12 © Copyright 2023 Lewis Creek Systems, LLC All Rights Reserved jim@lewiscreeksystems.com www.lewiscreeksystems.com • Tier 1: Did not know and, with reasonable diligence, would not have known – $114 - $57,051 per violation, $28,525 annual max (may use an Affirmative Defense) • Tier 2: Violation due to reasonable cause and not willful neglect – $1,141 - $57,051 per violation, $114,102 annual maximum (may get a Waiver) • Willful Neglect: Conscious, intentional failure or reckless indifference to the obligation to comply with the administrative simplification provision violated • Tier 3: Violation due to willful neglect and corrected within 30 days of when known or should have been known with reasonable diligence – $11,182 - $57,051 per violation, $285,255 annual maximum • Tier 4: Violation due to willful neglect and NOT corrected within 30 days of when known or should have been known with reasonable diligence – $57,051 per violation, $1,711, 533 annual maximum • See the HHS OCR enforcement pages: http://www.hhs.gov/hipaa/for- professionals/compliance-enforcement
  • 13. 13 Your to-do list… ✓ Review how you use and share PHI ✓ Look for invalid pseudonymization, such as using patient initials as a name substitute ✓ For insecure communications, use a private code ✓ Call on a professional if you are not sure! ✓ Think through the context of information – where did it come from and when? ✓ Verify that your procedures and processes are being followed and actually work ✓ Be prepared for breaches, just in case ✓ Keep improving your processes and verification © Copyright 2023 Lewis Creek Systems, LLC All Rights Reserved jim@lewiscreeksystems.com www.lewiscreeksystems.com
  • 14. Thank you! Any Questions? For additional information, please contact: Jim Sheldon-Dean Lewis Creek Systems, LLC 5675 Spear Street, Charlotte, VT 05445 jim@lewiscreeksystems.com www.lewiscreeksystems.com 14 © Copyright 2023 Lewis Creek Systems, LLC All Rights Reserved jim@lewiscreeksystems.com www.lewiscreeksystems.com Register Now!!!