HIPAA, Business Associates, and the Cloud

BakerHostetler
Contact

Under the Final Rule, as previously discussed, business associates must comply with the technical, administrative, and physical safeguard requirements under the Security Rule. Liable for violations under the Security Rule, a business associate must comply with use or disclosure limitations in its contract, as well as limitations expressed in the Privacy Rule. A business associate is a person or entity that creates, receives, maintains, or transmits protected health information (PHI) in fulfilling certain functions or activities for a HIPAA covered entity. The Final Rule clarifies that an entity that maintains PHI for a covered entity (e.g. storage data company) is a business associate. The definition of a business associate expressly includes health information organizations, e-prescribing gateways, and other persons that provide data transmission services with respect to PHI and require “routine access” to PHI (e.g. PHR vendors that provide services to covered entities). In addition, business associate liability flows to any subcontractors and downstream entities that work at the direction of or on behalf of a business associate and handle PHI.

In all health care sectors, new delivery models (e.g., EHRs, HIEs, ACOs, telemedicine) and evolving technologies (e.g., cloud computing, mobile devices, interactive and social media) are driving the increased use of third-party vendors. Third parties are entrusted with patient personal information and PHI. Cloud computing is one area where covered entities are entrusting patient information with vendors. Health care providers are implementing cloud EHRs, ePrescribing and IT health service desks. Health care payrors are placing outcomes-based research and analytic applications in the cloud. Pharma/drug providers are consolidating systems in the cloud. Human resources for various health care entities are implementing cloud human resources consolidated systems, including regarding employee benefits.

Regarding cloud service providers specifically, under the Final Rule, a cloud service provider is a business associate if the data is maintained in the performance of its function. The cloud service provider is a business associate even if the agreement with the covered entity does not contemplate any access, or where access is only on a random or incidental basis. Under the Final Rule, the test is persistence of custody – not the degree (if any) of access. Prior to the Final Rule, cloud providers relied on the conduit exception.  Under the Final Rule, the conduit exception only incudes courier services that transport information (persistent vs. transient opportunity to access PHI). As such, covered entities must ensure that their cloud service providers are safeguarding patient information.

At the OCR/NIST 6th Annual Conference on Safeguarding Health Information: Building Assurance through HIPAA Security, the following issues were recommended for covered entities to address with their cloud computing vendors (and business associates generally):

  • Where is PHI located?
  • How are break risks minimized? Does the vendor have an incident response plan?
  • How is breach notification prevented? Does the vendor encrypt data at rest and in transit?
  • Does the vendor have an incident response plan?
  • How does the vendor track access to and modifying of PHI? Is there audit logging and monitoring?
  • Does the vendor segregate data to prevent unauthorized access to and disclosure of PHI?
  • How is PHI disposed of at the end of the contract? What is the vendor’s policy and procedure on data retention and destruction?
  • How does the vendor prevent the threat of knowledgeable insiders? Does the vendor have internal security procedures (e.g. employee background checks, training, method for monitoring physical and logical access)?

In order to monitor business associates, post Final Rule, health care industry trend demonstrates that covered entities are adding pre-contract risk/controls assessments, enhancing contractual safeguards and business associate agreements, and adding/enhancing post-contract audits. With liability flowing downstream, covered entities and business associates must complete their due diligence before entering into contracts with vendors who may maintain PHI.

 

DISCLAIMER: Because of the generality of this update, the information provided herein may not be applicable in all situations and should not be acted upon without specific legal advice based on particular situations.

© BakerHostetler | Attorney Advertising

Written by:

BakerHostetler
Contact
more
less

BakerHostetler on:

Reporters on Deadline

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
Custom Email Digest
- hide
- hide