In its new omnibus final rule governing health data privacy, security, and enforcement published Jan. 25,
At the same time, HHS tightened the standards for notification of breaches of the security of health information that it prescribed in an interim final rule in 2009.
These two moves—even setting aside the numerous other compliance requirements associated with the final rule—substantially raise the stakes for a wide variety of entities that may have access to medical information, particularly in light of the heightened civil and criminal penalties for data protection violations authorized by the 2009 Health Information Technology for Economic and Clinical Health (HITECH) Act.
Clearly, the new final rule merits close attention and counsels in favor of proactive—and timely—compliance planning. The final rule takes effect March 26 and compliance with most of its provisions is required by Sept. 23.
Background on the HITECH Act and the HIPAA Privacy and Security Rules
In the HITECH Act, Congress prescribed a number of changes to the HIPAA Privacy and Security Rules, which collectively serve to protect the privacy and security of “protected health information” (PHI).
In the HITECH Act, Congress changed this framework by making business associates directly liable for violation of relevant aspects of the Privacy Rule and the Security Rule. And, in an important step to help protect individuals from the adverse consequences of breaches of the security of their PHI, Congress also required HHS to adopt regulations requiring notification to individuals and HHS (and in certain cases, the media) of such breaches. Under the HITECH Act, covered entities bear the obligation to notify individuals and HHS; business associates must notify the covered entities from or on behalf of whom the business associate received the affected PHI.
What Has HHS Now Done With the “Business Associate” Definition?
Despite receiving many objections, HHS adopted in the final rule its proposed expansion of the HIPAA rules’ definition of business associate to include subcontractors of HIPAA business associates. HHS acknowledged that the proposed expansion was viewed by many as “not the intent of Congress and beyond the statutory authority of the Department,” and that commenters believed “creating direct liability for subcontractors will discourage such entities from operating and participating in the health care industry.”
According to HHS, its expanded business associate definition is necessary to prevent the lapse in protection for PHI once a subcontractor is enlisted to assist a primary business associate. Thus, under the final rule, “covered entities must ensure that they obtain satisfactory assurances required by the [HIPAA] Rules from their business associates, and business associates must do the same with regard to subcontractors, and so on, no matter how far ‘down the chain’ the information flows.”
Who IS and Who Is NOT a Business Associate?
HHS received a number of comments objecting to the proposed expanded definition of business associate on the ground that it was confusing and ambiguous. As these comments emphasized, the ability to determine which entities are covered by the definition is critical, particularly in light of the enhanced penalties authorized by the HITECH Act. In response, HHS provided some further clarification and guidance on the scope of the new business associate definition. However, ambiguities remain.
The final rule leaves intact the basic concept of who is a business associate—i.e., a person (individual or entity) who, other than as a member of the workforce of a particular covered entity,
The same principles apply under the final rule with respect to subcontractors of business associates. The final rule defines a subcontractor as “a person to whom a business associate delegates a function, activity, or service, other than in the capacity of a member of the workforce of such business associate.”
Importantly, as HHS has emphasized, “[t]he final rule establishes that a person becomes a business associate by definition, not by the act of contracting with a covered entity or otherwise.
The possibility of being a business associate without the existence of a BAA suggests the need for all entities to be proactive about determining their own business associate status. For example, a document shredder hired by a covered entity/business associate to dispose of documents may or may not be a business associate, depending on whether the documents to be disposed of contain PHI. If they do, the entity is a business associate; if they do not, the entity is not a business associate.
When Is an Entity Deemed Liable for the Acts of Its Business Associate?
Another area in which the final rule heightens potential liability with respect to business associates involves the legal principle of agency, under which the conduct of an “agent” is deemed attributable to the principal on whose behalf the agent acts. Although in general, covered entities are not liable for the acts of their business associates, a covered entity is liable, “in accordance with the federal common law of agency, for a violation based on the act or omission of any agent of the covered entity.
The final rule eliminates this BAA exception. Under the final rule, a covered entity will be liable for the HIPAA rule violations of its business associate agents regardless of whether there is a compliant BAA with those agents. According to HHS, this change serves “to ensure, where a covered entity or business associate has delegated out an obligation under the HIPAA Rules, that the covered entity or business associate would remain liable for penalties for the failure of its business associate agent to perform the obligation on the covered entity or business associate’s behalf.”
As indicated by the comments filed with HHS on the proposed rule, many covered entities and business associates are understandably concerned about their potential liability under an “agency” theory. HHS, while firmly rejecting the notion that it should abandon the agency liability doctrine in the final rule, did make an effort to provide further guidance to covered entities and business associates in determining where agency relationships exist.
As HHS noted, it is well understood that the “terms, statements, or labels given to parties (e.g., independent contractor) do not control whether an agency relationship exists.”
Frequently, a key indicator of such authority is the written contract (if any) between the parties. In general, the more specific the contract is in setting forth the respective obligations of the parties, the less likely that it establishes an agency relationship. For example, a business associate generally would not be an agent if it enters into an agreement with a covered entity that sets forth very clearly the terms and conditions of the business associate’s performance, leaving the covered entity with no ability to control that performance, other than through an amendment of the terms of the agreement or by suing for breach of contract. On the other hand, if the parties’ agreement authorizes the covered entity to direct the performance of the service provided by its business associate during the course of the relationship, the business associate likely is the covered entity’s agent.
These principles have important implications for BAAs under the Privacy and Security Rules. Often, covered entities seek to maintain flexibility to decide, on a case-by-case basis, how their business associates will fulfill their BAA obligations, such as the obligation to either make PHI available for amendment or, rather, to simply amend the PHI. A BAA might state, for example, that the “business associate must make available protected health information based on the instructions to be provided by or under the direction of a covered entity.”
This suggests that covered entities—and business associates with respect to subcontractors—should consider how their BAAs may affect their own liability for the acts of their business associates. Although limiting such liability may entail sacrificing some control over a business associate, the benefits could be substantial, particularly with respect to potential violations of the Breach Notification Rule (discussed further below). In general, covered entities and business associates should undertake to identify, based on all relevant facts and with the advice of legal counsel, which, if any, of their business associates are their “agents.” Accurately making such determinations, and implementing procedures to ensure adequate supervision and monitoring of agents, will be a critical, ongoing process for HIPAA covered entities and business associates.
Must BAAs Be Amended Under the Final Rule?
Although, as noted, the existence of a BAA is not determinative of whether a “business associate” relationship exists, the final rule nevertheless explicitly requires BAAs. In accordance with the HITECH Act, all BAAs must incorporate the new privacy and security obligations established the act, including the security breach notification requirements. And, by extending the business associate definition to qualifying subcontractors of business associates, the final rule mandates BAAs not only for covered entities’ business associates, but also for subcontractor business associates, as well as sub-subcontractor business associates, sub-sub-business associates, etc. This will be a new endeavor with respect to many subcontractors, because although it has been a business associate’s obligation to “[e]nsure that any agents, including a subcontractor, to whom it provides protected health information … agrees to the same restrictions and conditions that apply to the business associate with respect to such information,”
To assist covered entities and business associates in ensuring that their BAAs contain all the required clauses, HHS has posted sample BAA clauses on its website.
Recognizing the magnitude of this task, HHS has provided an extended timetable for the execution of fully compliant BAAs. Rather than requiring that this be done by the final rule’s general compliance date of Sept. 23, HHS is giving covered entities and business associates staggered deadlines, depending on whether there is an existing BAA. Specifically, the final rule provides that any BAA that (i) complies with the current Privacy and Security Rules, (ii) was entered into prior to Jan. 25 (the publication date of the final rule), and (iii) is not renewed or modified between March 26 (the final rule’s effective date) and Sept. 23 (the final rule’s general compliance date), will be deemed in compliance with the final rule until the earlier of:
1. the date the BAA is renewed or modified on or after Sept. 23, 2013, and
2. Sept. 22, 2014.
Essentially, this means that, absent any reworking of a preexisting, currently compliant BAA, the BAA will be deemed in compliance with the final rule for a full year after the final rule’s general compliance date.
New Risks Under the Breach Notification Rule: What Triggers the Notification Requirements?
As noted, HHS adopted the Breach Notification Rule in 2009 as interim final rule and invited comment while commencing enforcement. The final rule reflects HHS’s consideration of the comments it received, but largely leaves the 2009 version intact—with one significant exception. Whereas the interim rule provided that notifications of security incidents involving PHI were required only if there was evidence of a “significant risk of harm” to individuals from the incident, the final rule requires notification unless the covered entity or business associate, as applicable, “demonstrates that there is a low probability that the protected health information has been compromised.”
The Interim Rule and Reactions to It
The Breach Notification Rule applies to any “unsecured” protected health information (PHI), which means any individually identifiable health information that is unsecured. Electronic PHI is unsecured under the rule if it is neither properly encrypted nor destroyed. Any other form of PHI is unsecured unless it is destroyed.
The trigger for the application of the HHS breach notification requirements is a breach of data security. With three limited exceptions, the interim rule defined a breach of the security of PHI as “the acquisition, access, use, or disclosure” of PHI not permitted under the Privacy Rule “which compromises the security or privacy” of the PHI.
The “risk of harm” standard in the interim rule drew sharp criticism, including from members of Congress. In a formal comment letter on the interim rule, six representatives asserted that the HITECH Act “does not imply a harm standard.”
Similar views were expressed by certain privacy advocates.
The Final Rule’s Changes
In response to the criticisms of the “risk of harm” standard, while recognizing the points made in support of such a standard, HHS replaced the risk of harm component of the breach definition in the final rule with the new presumption in favor of notification. HHS explained its reasons for the change as follows:
We believe that the express statement of this presumption in the final rule will help ensure that all covered entities and business associates interpret and apply the regulation in a uniform manner and also [that it] responds to commenters that indicated the default function of the rule was unclear… . [W]e have removed the harm standard and modified the risk assessment to focus more objectively on the risk that the protected health information has been compromised… . The final rule … identifies the more objective factors covered entities and business associates must consider when performing a risk assessment to determine if the protected health information has been compromised and breach notification is necessary.
The “objective factors” referred to by HHS consist of particular situational circumstances that, in HHS’s view, can demonstrate that there is a low probability that PHI information has been compromised. Specifically, under the final rule, covered entities and business associates must conduct a risk assessment that analyzes:
(1) the nature and extent of the protected health information involved, including the types of identifiers and the likelihood of re-identification;
(2) the unauthorized person who used the protected health information or to whom the disclosure was made;
(3) whether the protected health information actually was acquired or viewed; and
(4) the extent to which the risk to the protected health information has been mitigated.
A covered entity or business associate must address each of these factors in analyzing the probability that PHI has been compromised by a security incident, although other factors may be considered as well. The required assessment should consider all factors in combination, and HHS “expect[s] these risk assessments to be thorough, completed in good faith, and for the conclusions reached to be reasonable.”
The types of considerations relevant to the four factors that must be addressed include:
1. What type and amount of PHI was subject to disclosure? For example, was it just a list of a dentists’ charges to a particular medical account number? Or was it a record of an abortion or a prescription for AIDs medication? In the former case, it likely would be reasonable to conclude that there is low probability that the PHI could be used by an unauthorized recipient in a manner adverse to the individual or otherwise used to further the unauthorized recipient’s own interests. In contrast, in the latter case, such a conclusion likely would not be reasonable.
2. Who impermissibly used or accessed the PHI? Does the Privacy Rule or Security Rule, or any similar statutory or regulatory protections for data privacy, apply to the unauthorized recipient? If so, there may be a lower probability that the protected health information has been compromised, since the recipient is required to keep the information confidential and protect its security.
3. Was the PHI returned before there was an opportunity for it to be actually acquired or viewed? For example if the PHI was in a file stored on a laptop computer that was lost or stolen but then recovered, and a forensic analysis shows that file was not opened or transferred, the probability of compromise of the PHI is low. In contrast, if a fax containing PHI went to the wrong patient, there would be a higher probability of misuse.
4. Were steps taken to mitigate risk of harm, such as obtaining satisfactory assurances from the unauthorized recipient of PHI that the PHI will not be retained or further used or disclosed? If a written confidentiality agreement is obtained that provides commitments to that effect, for example, it may be reasonable to conclude that there is a low probability that the PHI was compromised.
A thorough assessment of these factors must be done in any case of a suspected breach (unless a decision is made to proceed with the notifications in any event). Because covered entities and business associates have the burden of proof to demonstrate that all notifications were provided or that an impermissible use or disclosure did not constitute a breach, it is critical to document the basis for determinations that notifications were not required, such as in memoranda and reports, including forensic evidence. If any such determination is called into question in an investigation or administrative proceeding, this documentation will be essential to defend the decision not to provide notifications.
Implications of Business Associate Relationships for Breach Notifications
As noted, HHS did not alter the basic requirements of the Breach Notification Rule, other than the “risk of harm” standard, in the final rule. However, HHS did clarify and underscore how important it is for covered entities and business associates (now including business associate subcontractors) to delineate clearly the responsibilities of a business associate, and in particular business associates acting as agents, to mitigate potential liability under the Breach Notification Rule.
As has previously been required, under the final rule, a covered entity must provide breach notifications to individuals without “unreasonable delay” and in any event within 60 days of the date of discovering the breach. The same time constraint applies to the notifications business associates must provide to covered entities upon discovery of a security breach. In both cases, a breach is deemed “discovered” by the covered entity/business associate on the date that any member of the workforce, or any agent, of the covered entity/business associate discovers the breach. Discovery of a breach occurs at the time the breach is first known or, “by exercising reasonable diligence would have been known,” to the discovering entity.
Because the discovery of a breach by a business associate acting as an agent of a covered entity is imputed to the covered entity, the covered entity must provide notifications within 60 days after the date when such a business associate discovers the breach, not 60 days after the date when the business associate notifies the covered entity of the breach. Under the final rule, the same time constraint governs notifications that must be made by business associates with respect to breaches discovered by their subcontractor business associates acting as agents.
In comments submitted to HHS on the interim rule, objections were made to the requirement that breach notifications be provided within 60 days after a data security incident is first discovered, as opposed to 60 days after it is determined, based on an investigation and analysis, that the incident actually constitutes a breach.
The final rule’s retention of the maximum 60-day notification period, coupled with the new presumption in favor of notification, underscores the importance of properly managed business associate relationships, particularly those involving business associates acting as agents. HHS alluded to this in issuing the final rule, stating that “[b]ecause of the agency implications on the timing of breach notifications, we encourage covered entities to discuss and define in their business associate agreements the requirements regarding how, when, and to whom a business associate should notify the covered entity of a potential breach.”
To properly address the timing for breach notifications in their BAAs, covered entities, as well as business associates with respect to their subcontractors, need to determine, with the assistance of legal counsel, which of their business associates qualify as agents. This determination can help inform (and in fact be driven by, as discussed above regarding the indicia of agency), appropriate language in BAAs. If a covered entity seeks to ensure that one or more of its business associates will not be deemed its agent—which will mean the business associate’s discovery of a breach will not be imputed to the covered entity—it should include in the BAA, as well as any underlying services agreement with the business associate, as much specificity as possible regarding the business associate’s obligations. For example, the BAA could state, with respect to breach notifications, that the business associate “shall notify the covered entity within three business days of any known or suspected breach involving PHI” and specify that such notification include a report on the date and time of the breach, the type and amount of PHI affected, the known facts of how the breach occurred and whether and how it has been addressed, and a description of all steps being taken to mitigate any harm to individuals from the breach. These types of specific requirements will help in both defining the nature of the relationship between the parties (i.e., whether it involves agency) and in ensuring that they will be able to responsibly and effectively fulfill their obligations under the omnibus final rule.
Learn more about Bloomberg Law or Log In to keep reading:
See Breaking News in Context
Bloomberg Law provides trusted coverage of current events enhanced with legal analysis.
Already a subscriber?
Log in to keep reading or access research tools and resources.