Page tree

Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Title: Disclosures of Personally Identifiable Health Information to Business Associates
Subject: Office of Compliance & Corporate Integrity (OCCI)
Policy No: OCCI:2013:P08
Applies: RowanSOM
Issuing Authority: Chief Audit, Compliance & Privacy Officer; Director of Information Security
Responsible Officer: Chief Audit, Compliance & Privacy Officer; Director of Information Security
Date Adopted: 07/01/2013
Last Revision: 03 01/2526/20202021
Last Reviewed: 0301/2526/20202021

I.    PURPOSE

To assure compliance with the requirements of the Health Insurance Portability and Accountability Act (HIPAA) of 2004, Health Information Technology for Economic and Clinical Health (HITECH) Act of 2009 and the Omnibus Privacy Final Rule of 2013 in relation to disclosures of Protected Health Information (PHI) and to entering into contracts with business associates.

...

  1. Attachment 1, Is a Person or Entity a "Business Associate" and Required to Enter Into a Written Business Associate Contract?
  2. Attachment 2, Examples of Potential Business Associates
  3. Attachment 3, Treatment, Payment and Health Care Operations
  4. Attachment 4, Business Associates Agreement Involving the Access to Protected Health Information
  5. Attachment 5, Hyperlink

By Direction of the President:

Signature on file

                                                                                                       

Chief Audit, Compliance and Privacy Officer

By Direction of the President:

Signature on file

                                                                                                       

Director of Information Security

...

VIII. NON-COMPLIANCE AND SANCTIONS

Any individual who violates this policy shall be subject to discipline up to and including dismissal from the University in accordance with their union and University rules.  Civil and criminal penalties may be applied accordingly.  Violations of this policy may require retraining and be reviewed with employee during the annual appraisal process. The Deans of each College, Vice Presidents, and University President, with the assistance of the Department of Human Resources, will enforce the sanctions appropriately and consistently to all violators regardless of job titles or level within the University and in accordance with bargaining agreements for represented employees. Any sanction costs or fines will be borne by the Department and the Department Chair or VP will determine how these funds will be assigned.

By Direction of the President:


Signature on file

                                                                                                       

Chief Audit, Compliance and Privacy Officer



By Direction of the President:


Signature on file

                                                                                                       

Director of Information Security


ATTACHMENT 1
Is a Person or Entity a "Business Associate" and 
Required to Enter Into a Written Business Associate Contract?





Image Added


ATTACHMENT 2 
Examples of Potential Business Associates 

(This is not an all-inclusive list, nor is every arrangement listed necessarily a business associate. Use the attached flowchart and policy and procedure to analyze whether the relationship is a business associate relationship under HIPAA. Contact Legal Management at 2-4705 for assistance in the analysis.)

Accountants

Accounting services and firms

Accreditation services

Actuarial services

Actuarial specialists

Adjudication services

Administrative services

Advertisers

Architects, builders, and contractors

Asset-based lenders to healthcare facilities

Attorneys

Auditors

Billing service companies

Bulk mailing services

Care management programs

Civic groups and other local groups help out on ad hoc basis with patients who are hospitalized for a traumatic event or complicated illness (e.g., Shrine Temples, Ronald McDonald House)

Coding providers and experts

Community health management information systems

Computer maintenance services and companies

Consulting services

Contract Research Organization – An entity used by pharmaceutical and device manufactures to monitor clinical research trials

Copy services

Data aggregation services

Device manufactures

Document storage and destruction vendors

Financial service companies

Government health data systems

Hardware vendors

Healthcare consultants (e.g.,

Image Removed

...

(This is not an all-inclusive list, nor is every arrangement listed necessarily a business associate. Use the attached flowchart and policy and procedure to analyze whether the relationship is a business associate relationship under HIPAA. Contact Legal Management at 2-4705 for assistance in the analysis.)

Accountants

Accounting services and firms

Accreditation services

Actuarial services

Actuarial specialists

Adjudication services

Administrative services

Advertisers

Architects, builders, and contractors

Asset-based lenders to healthcare facilities

Attorneys

Auditors

Billing service companies

Bulk mailing services

Care management programs

Civic groups and other local groups help out on ad hoc basis with patients who are hospitalized for a traumatic event or complicated illness (e.g., Shrine Temples, Ronald McDonald House)

Coding providers and experts

Community health management information systems

Computer maintenance services and companies

Consulting services

Contract Research Organization – An entity used by pharmaceutical and device manufactures to monitor clinical research trials

Copy services

Data aggregation services

Device manufactures

Document storage and destruction vendors

Financial service companies

Government health data systems

Hardware vendors

Healthcare consultants (e.g., risk management, information technology, billing, coding and management)

Hospital associations (National and State)

HVAC vendors

Independent contractors

...

  1. "Treatment" - the provision, coordination, or management of health care and related services by one or more health care providers, including:
    1. the coordination or management of health care by a health care provider with a third party;
    2. consultation between health care providers relating to a patient; or
    3. the referral of a patient for health care from one health care provider to another. 
  2. "Payment" - the activities undertaken to obtain payment for the provision of healthcare; and relates to the individual to whom health care is provided and includes, but is not limited to:
    1. Determinations of eligibility or coverage (including coordination of benefits or the determination of cost sharing amounts), and adjudication or subrogation of health benefit claims;
    2. Billing, claims management, collection activities, obtaining payment under a contract for reinsurance (including stop-loss insurance and excess of loss insurance), and related health care data processing;
    3. Obtaining information about the location of the individual is a routine activity to facilitate the collection of amounts owed and the management of accounts receivable, and, therefore, would constitute a payment activity.
    4. Debt collection is recognized as a payment activity.
    5. Review of health care services with respect to medical necessity, coverage under a health plan, appropriateness of care, or justification of charges;
    6. Utilization review activities, including pre-certification and pre-authorization of services, concurrent and retrospective review of services; and
    7. Disclosure to consumer reporting agencies of any of the following protected health information relating to collection of reimbursement:
      1. Name and address;
      2. Date of Birth;
      3. Social Security Number;
      4. Payment history;
      5. Account number; and
      6. Name and address of the health care provider and/or health plan.
  3. "Health Care Operations" - any of the following activities:
    1. Conducting quality assessment and improvement activities, including outcomes evaluation and development of clinical guidelines, population-based activities relating to improving health or reducing health care costs, protocol development, case management and care coordination, contracting of health care providers and patients with information about treatment alternatives; and related functions that do not include treatment;
    2. Reviewing the competence or qualifications of health care professionals, evaluating practitioner and provider performance, health plan performance, conducting training programs in which students, trainees, or practitioners in areas of health care learn under supervision to practice or improve their skills as health care providers, training of non-health care providers, accreditation, certification, licensing, or credentialing activities;
    3. Conducting or arranging for medical review, legal services and auditing functions, including fraud and abuse detection and compliance programs;
    4. Business planning and development, such as conducting cost-management and planning-related analyses related to managing and operating the entity, including formulary development and administration, development or improvement of methods of payment or coverage policies; and
    5. Business management and general administrative activities of Rowan University, including, but not limited to:
      1. Resolution of internal grievances;
      2. Due diligence in connection with the sale or transfer of assets to a potential successor in interest, if the potential successor in interest is a covered entity or, following completion of the sale or transfer, will become a covered entity.

ATTACHMENT 4

Business Associates Agreement Involving the Access to Protected Health Information 

...

Vendor: ___________________________________________

Business Associate Agreement
Involving the Access to Protected Health Information 

...

ATTACHMENT 4
RowanSOM BAA-2019.doc 

View file
nameRowanSOM BAA-2019.doc
height250

I.     Definitions  [1]

  1. Breach means the unauthorized acquisition, access, use, or disclosure of protected health information ("PHI") which compromises the security or privacy of such information in violation of HIPAA, the HITECH Act, the HIPAA Regulations, and/or the HITECH Regulations, except when the covered entity demonstrates that there is a low probability that the PHI has been compromised. The term "Breach" does not include: 
    1. Any unintentional acquisition, access, or use of PHI by an employee or person acting under the authority of a Covered Entity or Business Associate if:
      1. Such acquisition, access, or use was made in good faith and within the course and scope of the employment or other professional relationship of such employee or person, respectively, with the Covered Entity or Business Associate; and 
      2. Does not result in further unauthorized use or disclosure; or
    2. Any inadvertent disclosure by a person who is otherwise authorized to access PHI at a Covered Entity or Business Associate to another, similarly authorized person at the same Covered Entity, Business Associate or organized health care arrangement in which the Covered Entity participate and such information received as a result of such disclosure is not further used or disclosed in an impermissible manner.
  2. Business Associate means a service provider that receives PHI from, or creates or maintains or transmits PHI on behalf of, a Covered Entity including, but not limited to, claims processing or administration, data analysis, processing or administration, utilization review, quality assurance, billing, benefits management, practice management, re-pricing, transcription, legal, actuarial, accounting, consulting, data aggregation, administrative, accreditation or financial services, and vendors that offer personal health records to patients as part of a Covered Entity's electronic health record, where the service or function involves the use or disclosure of individually identifiable health information from the Covered Entity or from another Business Associate of the Covered Entity. A Business Associate excludes, among others, employees of Covered Entities.
  3. Covered Entities include  health care providers that transmit patient health information electronically in connection with a covered transaction, (ii) health plans (including employer-sponsored employee welfare benefit plans and self-insured employer-offered health plans), and (iii) health care clearinghouses. 
  4. Data Aggregation means, with respect to PHI created or received by a Business Associate, the combining of PHI received by a Business Associate in its capacity as a Business Associate for more than one Covered Entity to permit data analyses that relate to the health care operations of the respective Covered Entities. 
  5. Designated Record Set means any grouping of information that includes PHI and is maintained, collected, used, or disseminated by or for a Covered Entity that is  medical records and billing records about individuals, and/or (ii) enrollment, payment, claims adjudication, and case or medical management record systems maintained by or for a health plan, used, in whole or in part, by or for the Covered Entity, to make decisions about individuals. 
  6. Electronic Protected Health Information ("Electronic PHI") means PHI that is transmitted by or maintained in electronic media. 
  7. Individual (or patient) means the person who is the subject of PHI and includes a person who qualifies as a personal representative (45 C.F.R. 164.502(g)). 
  8. Protected Health Information ("PHI") means physical and/or mental health and demographic information collected from an individual and created or received by a Covered Entity and/or Business Associate that identifies or could reasonably identify an individual (i.e., is "individually identifiable") and is held or transmitted in any form including electronic media. PHI excludes educational records and employment records held by a Covered Entity as an employer (45 C.F.R. 164.501). If the patient has been deceased for more than fifty (50) years, the information will no longer be PHI. 
  9. Required By Law means that Covered Entities may use and disclose PHI without individual authorization as required by law (including by statute, regulation, or court orders) in accordance with the requirements in 45 C.F.R. 164.512(c), (e) or (f).
  10. Unsecured PHI means PHI not rendered unusable, unreadable, or indecipherable to unauthorized individuals through the use of technology or methodology specified by the Secretary of HHS. PHI of a patient who has been deceased for more than fifty (50) years [164.502(f)].

II.    Permitted Uses and Disclosures of PHI by Business Associate 

  1. Except as otherwise limited in this BAA, Business Associate may use or disclose PHI to perform functions, activities, or services for, or on behalf of, Covered Entity as specified in the Underlying Agreement, provided that such uses and/or further disclosures
    1. do not violate the requirements of HIPAA's Business Associate contract standard at 45 C.F.R. 164.504(e)(1) and/or the HITECH Act, if done by the Covered Entity, 
    2. are the minimum necessary PHI to accomplish the intended purpose, or
    3. are Required By Law. 
  2. Except as otherwise limited in this BAA, Business Associate may use or disclose PHI for the proper management and administration of the Business Associate or to carry out the legal responsibilities of Business Associate, provided, however, that any such uses or disclosures are Required By Law, or Business Associate obtains reasonable assurances from the person to whom the information is disclosed that  the PHI will remain confidential and used or further disclosed only as Required By Law or for the purpose for which it was disclosed to the person, and (ii) the person notifies the Business Associate of any instances of which it is aware in which the confidentiality of the information has been Breached. 
  3. Except as otherwise limited in this BAA, Business Associate may use PHI to provide Data Aggregation services to Covered Entity (42 C.F.R. 164.504(e)(2)(B)). 
  4. Business Associate may use PHI to report violations of law to appropriate federal and state authorities as permitted under HIPAA and/or other federal and state laws. (45 C.F.R. 164.502(j)(1)). 

III.   Duties and Obligations of Business Associate Related to PHI

  1. Business Associate shall not use or disclose PHI other than as permitted or required by the Underlying Agreement, this BAA, and/or as Required By Law. Business Associate shall immediately notify Covered Entity of any use or disclosure of PHI in violation of this BAA.
  2. Business Associate shall use and implement administrative, physical, and technical safeguards that reasonably and appropriately protect the confidentiality, integrity and availability of PHI and/or Electronic PHI that it creates, receives, maintains, or transmits on behalf of Covered Entity. 
  3. Business Associate shall notify, in writing, the Covered Entity when the Business Associate discovers a Breach of Unsecured PHI. A Breach is deemed to have been discovered by a Business Associate as of the first day on which Business Associate (by its employee, officer, or other agent) knows or would have known of such Breach by exercising reasonable diligence. Business Associate's notification to Covered Entity (i.e., RowanSOM) shall:
    1. Be made to the Covered Entity without unreasonable delay and in no event later than ten (10) days following the discovery of a breach, except in the case of a Business Associate that is an agent of the Covered Entity, in which case the Business Associate must provide the Covered Entity with immediate notification of the breach, except where law enforcement officials determine that a notification would impede a criminal investigation or cause damage to national security. Unless the language in the underlying agreement between the parties indicates that a Business Associate is an independent contractor, then the Business Associate shall be considered an agent of Rowan University for purposes of breach notification.
    2. To the extent possible, provide the identity of each Individual whose Unsecured PHI was, or is reasonably believed to have been, Breached, and any other information that the Covered Entity is required to include in the notice to affected Individuals under 45 C.F.R. 164.404(c), either at the time of notice of Breach to the Covered Entity or as promptly thereafter as information becomes available. Include information in substantially the same form as the "Notification To the Covered Entity About A Breach of Unsecured Protected Health Information" available to Business Associates at RowanSOM website at https://www.rowan.edu/compliance
  4. Business Associate is subject to the same legal requirements to cure, terminate or report violations to the Secretary of HHS under the same duty and in the same manner as Covered Entity. 
  5. Business Associate shall mitigate, to the extent practicable, any harmful effect known to it resulting from an unauthorized use or disclosure of PHI or Breach of Unsecured PHI. 
  6. Business Associate shall ensure that any agent, including a subcontractor, to whom it provides PHI  received from, or (ii) created or received by Business Associate on behalf of, a Covered Entity agrees, in writing, to the same restrictions and conditions that apply through this BAA to Business Associate with respect to such PHI. 
  7. Business Associate  shall provide Covered Entity access to its premises for a review and demonstration of its internal practices and procedures for safeguarding PHI and, (ii) to the extent applicable, shall provide access for inspection and copying of PHI in a Designated Record Set at reasonable times at the request of Covered Entity or, as directed by Covered Entity, to an Individual (45 C.F.R. 164.524). If Business Associate maintains an Electronic Health Record, Business Associate shall provide such information in electronic format to enable Covered Entity to fulfill its obligations under the HITECH Act. (42 U.S.C. §17935(e)). 
  8. Business Associate shall, upon request with reasonable notice, provide Covered Entity with an accounting of uses and disclosures of PHI provided to it by Covered Entity. 
  9. Business Associate agrees to use, disclose and request  only the minimum necessary PHI, as defined by law, and (ii) to the extent practicable, only the limited data set of PHI excluding direct identifiers, as defined in 45 C.F.R. 164.514(e)(2). 
  10. Business Associate shall document such disclosures of PHI and information related to such disclosures as would be required for a Covered Entity to respond to a request by an Individual for an accounting of disclosures of PHI (45 C.F.R. 164.528). Should a Covered Entity or an Individual request an accounting of disclosures of PHI pursuant to 45 C.F.R. 164.528, Business Associate agrees to promptly provide Covered Entity with information in a format and manner sufficient to respond no later than sixty (60) days after receipt of such request, subject to specific statutory exceptions. 
  11. Business Associate shall make its internal practices, books and records, including policies and procedures, relating to the use and disclosure of PHI received from, or created or received by Business Associate on behalf of, Covered Entity, available to Covered Entity at the request of Covered Entity, or the Secretary of HHS, for purposes of the Secretary determining Covered Entity's compliance with HIPAA and/or the HITECH Act in the time, manner and place designated by the Covered Entity and/or the Secretary.
  12. To the extent applicable, Business Associate shall make any amendment(s) to PHI in a Designated Record Set that Covered Entity directs or agrees to, no later than sixty (60) days after receipt of such request from a Covered Entity or Individual. 
  13. Business Associate agrees to abide by the limitations on marketing communications to Individuals regarding the purchase and use of products or services set forth in the HITECH Act and the HITECH Regulations. 
  14. Business Associate agrees and acknowledges that the administrative rules governing, and the civil and criminal penalties for violating, HIPAA, the HITECH Act, the HIPAA Regulations and the HITECH Regulations, apply to it in the same manner as they apply to Covered Entity, as more fully set forth at RowanSOM website at https://www.rowan.edu/compliance 

IV. Term and Termination 

  1. Term: The term of this BAA shall be effective as of the effective date of the Underlying Agreement and shall terminate when all of the PHI provided by Covered Entity to Business Associate, or created or received by Business Associate on behalf of Covered Entity, is destroyed or returned to Covered Entity, or, if it is infeasible to return or destroy PHI, protections are extended to such information, in accordance with the termination provisions of this Section IV. 
  2. Termination for Cause: Upon Covered Entity's knowledge of a material breach by Business Associate, Covered Entity shall either:
    1. Provide an opportunity for Business Associate to cure the breach or end the violation, and terminate this BAA and the Underlying Agreement if Business Associate does not cure the breach or end the violation within the time specified by Covered Entity;
    2. Immediately terminate this BAA and/or the Underlying Agreement if Business Associate has breached a material term of this BAA and cure is not possible; or 
    3. If neither termination nor cure is feasible, Covered Entity shall report the violation to the Secretary of HHS.
  3. Effect of Termination. 
    1. Except as provided in paragraph C.2 of this Section, upon termination of this BAA, for any reason, Business Associate shall return or destroy all PHI received from Covered Entity, or created or received by Business Associate on behalf of Covered Entity. This provision shall apply to PHI that is in the possession of subcontractors or agents of Business Associate. Business Associate shall retain no copies of PHI. 
    2. Except as provided in paragraph C.2 of this Section, if Covered Entity, in its sole discretion, requires that Business Associate destroy any or all PHI received from Covered Entity, or created or received by Business Associate on behalf of Covered Entity, either due to the termination of this BAA or otherwise, Business Associate shall certify, in writing, to Covered Entity that the PHI has been destroyed and rendered indecipherable, pursuant to HIPAA and the HITECH Act. This provision also shall apply to PHI that is in the possession of subcontractors or agents of Business Associate. 
    3. In the event that Business Associate determines that returning or destroying the PHI is infeasible, Business Associate shall provide to Covered Entity written notification of the conditions that make return or destruction infeasible within thirty (30) calendar days of such request. In such case, Business Associate shall extend the protections of this BAA to such PHI and limit further uses and disclosures of such PHI to those purposes that make the return or destruction infeasible, for so long as Business Associate maintains such PHI. This provision also shall apply to PHI that is in the possession of subcontractors or agents of Business Associate. 
    4. Should the Business Associate make a disclosure of PHI in violation of this BAA, Covered Entity shall have the right to immediately terminate any contract, other than this BAA, then in force between the Parties, including the Underlying Agreement. 
    5. The provisions of this Section IV.C. shall survive the termination of this BAA and the Underlying Agreement for any reason. 

V.    Remedies In Event of Breach 

  1. Business Associate agrees and acknowledges that there is a more than low probability that the PHI has been compromised and irreparable harm will result to Covered Entity, and to its business, in the event of breach by Business Associate of any covenants, duties, obligations and assurances in this BAA and further agrees that remedy at law for any such breach shall be inadequate and that damages resulting there from, are not susceptible to being measured in monetary terms. In the event of any such breach or threatened breach by Business Associate, Covered Entity shall be entitled to  immediately enjoin and restrain Business Associate from any continuing violations and (ii) reimbursement for reasonable attorneys' fees, costs and expenses incurred as a proximate result of the breach. The remedies in this Section V shall be in addition to any action for damages and/or other remedy available to Covered Entity for such breach.
  2. Business Associate shall indemnify and hold Covered Entity, its directors, officers, employees and agents harmless from any and all liabilities, damages, reasonable attorneys' fees, costs and expenses incurred by Covered Entity as a result of a breach of this BAA caused by Business Associate's actions or inactions and/or those of its employees and agents.
  3. Business Associate agrees and acknowledges that the provisions of this BAA shall be strictly construed.

VI.    Miscellaneous

  1. Independent Contractor. None of the provisions of this BAA and/or the Underlying Agreement are intended to create nor shall be deemed or construed to have created any relationship between the Parties other than that of independent entities contracting with each other unless otherwise explicitly stated in this BAA or the Underlying Agreement.
  2. Detrimental Reliance By Covered Entity. Business Associate agrees and acknowledges that its covenants, duties, obligations and assurances herein shall be detrimentally relied upon by Covered Entity in choosing to commence or continue a business relationship with Business Associate. Covered Entity shall not be liable to Business Associate for any claim, loss, or damage relating to Business Associate's use or disclosure of any information received from Covered Entity or from any other source.
  3. Regulatory References. Any reference herein to law means the law as in effect or as amended.
  4. Construction. The BAA shall be construed broadly and any ambiguity shall be resolved in favor of a meaning that complies and is consistent with applicable law.
  5. Severability. In the event that any provision of this BAA violates any applicable statute, ordinance or rule of law in any jurisdiction that governs this BAA, such provision shall be ineffective to the extent of such violation without invalidating any other provision of this BAA.
  6. Authority. The signatories below have the right and authority to execute this BAA for their respective entities and no further approvals are necessary to create a binding agreement.
  7. Covered Entity's Notices To Business Associate. Covered Entity's Notices to Business Associate are available on Rowan University's website at https://www.rowan.edu/compliance Such Notices include, but are not limited to,  any limitations in the Covered Entity's Notices of Privacy Practices that may affect the Business Associate, (ii) any changes in, or revocation of, permission by an Individual to use or disclose PHI, or (iii) any restriction in the use or disclosure of PHI that Covered Entity has agreed to.
  8. Compliance With State Law. Business Associate agrees and acknowledges that as the holder of individually identifiable health information it is subject to New Jersey law. In the event of any conflict between federal health care laws and New Jersey law, the Business Associate shall comply with the more restrictive provision.
  9. Conflict Among Contracts. Should there be conflict between the terms of this BAA and any other contract between the Parties (either previous or subsequent to the date of this BAA), the terms of this BAA shall control unless the Parties, in a subsequent writing, specifically otherwise provide.
  10. Modification. This BAA may only be modified by a writing signed by the Parties. The Parties agree to take such action subsequent to this BAA as necessary to amend the BAA from time to time as necessary for the Parties to comply with the requirements of any applicable law.
  11. Notices to Parties. Any notice required under this BAA to be given shall be made in writing to: 

To The Covered Entity:                                                                                                                                                                       To The Business Associate:
School/Unit/Department:                                                                                                                                                                      Name/Title:____________________ 
Address:                                                                                                                                                                                                 Address:
Telephone:                                                                                                                                                                                             Telephone:
E-Mail:                                                                                                                                                                                                    E-Mail: 

IN WITNESS WHEREOF, the parties have executed this Business Associate Agreement the day and year first written below. 

By: ROWANSOM                                                                                                                                                                                   By: [BUSINESS ASSOCIATE] 

[COVERED ENTITY] 

Approved:                                                                                                                                                                                               Approved: 
Title:                                                                                                                                                                                                       Title: 
Date:                                                                                                                                                                                                       Date:

                                            

ATTACHMENT 5

...