Health Insurance Portability and Accountability Act Breach Notification Procedures

  1. Reporting Potential Breaches. 泡芙视频 personnel shall immediately report any potential or suspected breach of PHI or 泡芙视频鈥檚 privacy policies to their unit鈥檚 HIPAA Compliance Officer, consistent with 泡芙视频鈥檚 Breach Notification Policy.聽
  2. Investigating Potential Breaches. The Privacy Officer, or their designee, shall promptly investigate any reported privacy breach or related individual complaints to determine whether there has been a breach of PHI as defined by HIPAA, and if so, whether and how notice should be given.

2.1.聽 The fact-finding investigation should gather details about:

  • 2.1.1.聽聽聽聽 Whether the alleged breach violates the HIPAA privacy rule, or 泡芙视频鈥檚 HIPAA privacy policies and procedures;
  • 2.1.2.聽聽聽聽 The manner in which the data was accessed, used, or disclosed and circumstances of the incident;
  • 2.1.3.聽聽聽聽 The date the incident occurred and the date it was discovered;
  • 2.1.4.聽聽聽聽 The number of individuals whose information was involved, and
  • 2.1.5.聽聽聽聽 The states in which the affected individuals reside.
  • 2.1.6.聽聽聽聽 The nature and extent of the information involved (e.g., did it involve PHI);
  • 2.1.7.聽聽聽聽 The identity of the unauthorized person who used or received the information;
  • 2.1.8.聽聽聽聽 Whether the information was acquired or viewed;
  • 2.1.9.聽聽聽聽 Whether the information is secured;
  • 2.1.10.聽 The probability that the information was compromised; and
  • 2.1.11.聽 The extent to which risk of further disclosure has been mitigated.

2.2.听 Determine whether the information is deemed 鈥渟ecured鈥 under HIPAA.聽 If the information meets one of the tests below for being secured, the incident will not be considered a breach and notification will not be necessary.

2.2.1.聽聽聽聽 Electronic data is considered secured if:

  • 2.2.1.1.聽聽聽聽聽聽聽聽聽 The data has been properly encrypted consistent with guidance issued by the Department of Health & Human Services and
  • 2.2.1.2.聽聽聽聽聽聽聽聽聽 The individual/entity with improper access to the information does not have access to the confidential decryption process or key.

2.2.2.听聽聽聽 Destroyed data may be considered secured if:

  • 2.2.2.1.聽聽聽聽聽聽聽聽聽 The information was stored on hard copy media, and the media has been shredded or destroyed in such a way that the PHI cannot be reconstructed. (Redaction is not an effective form of destruction.)
  • 2.2.2.2.听聽聽聽聽聽聽聽聽 The information is electronic and has been cleared, purged or destroyed consistent with National Institute of Standards &Technology (NIST) Guidelines, so that the PHI cannot be retrieved.

2.3.听 Determine whether the incident falls within an inadvertent acquisition or disclosure exception.聽 If the Breach Notification Team concludes that the incident meets one of the exceptions below, the incident will not be considered a breach and notification will not be necessary:

2.3.1.聽聽聽聽 Unintentional acquisition, access or use of PHI. 聽In order for this exception to apply, all of the following must be true:

  • 2.3.1.1.聽聽聽聽聽聽聽聽聽 The unauthorized acquisition, access or use of PHI was unintentional;
  • 2.3.1.2.聽聽聽聽聽聽聽聽聽 The individual who acquired, accessed or used the PHI is a member of 泡芙视频鈥檚 workforce, a member of a business associate鈥檚 workforce, a person acting under the authority of 泡芙视频 or 泡芙视频鈥檚 business associate, or the individual who acquired, accessed, or used the PHI did so in good faith; and
  • 2.3.1.3.聽聽聽聽聽聽聽聽聽 The acquisition, access or use did not result in any further impermissible use or disclosure.

2.3.2.聽聽聽聽 Inadvertent internal disclosure of PHI. This exception applies if all of the following are true:

  • 2.3.2.1.聽聽聽聽聽聽聽聽聽 The disclosure is made by an individual who is authorized to access PHI;
  • 2.3.2.2.听聽聽聽聽聽聽聽聽 The disclosure is made to an individual who is authorized to access PHI;
  • 2.3.2.3.听聽聽聽聽聽聽聽聽 Both individuals work for the same organization, which may be a 泡芙视频 Covered Component, a 泡芙视频 business associate, or an organized health care arrangement in which 泡芙视频 participates; and
  • 2.3.2.4.聽聽聽聽聽聽聽聽聽 The disclosure did not result in any further impermissible use or disclosure.

2.3.3.听听听听 Determine whether the information would not be retained. This exception applies if all of the following are true:

  • 2.3.3.1.聽聽聽聽聽聽聽聽聽 The disclosure is made to an unauthorized individual; and
  • 2.3.3.2.聽聽聽聽聽聽聽聽聽 泡芙视频 or its business associate has a good-faith belief that the unauthorized individual would not reasonably have been able to retain the information.

3.聽 Risk Assessment

3.1.聽 If the Breach Notification Team determines that the information was not secured and did not fall within one of the exceptions noted above, the Team must conduct a risk assessment. An impermissible use or disclosure is presumed to be a breach unless the risk assessment demonstrates that there is a low probability that the PHI has been compromised. If the Breach Notification Team concludes that there is a low probability that the PHI has been compromised, then notification is not required.

3.2.聽 Factors to consider include:

  • 3.2.1.聽聽聽聽 Whether it included other personally identifying information (e.g., social security numbers, driver鈥檚 license numbers, bank account/credit card numbers) that could be used for identity theft or identity fraud crimes;
  • 3.2.2.听聽聽聽 Whether it included information about an individual鈥檚 medical treatment, diagnoses, diseases, or similar detail;
  • 3.2.3.听聽聽聽 Whether the PHI could be reidentified based on the context and the ability to link the information with other available information;
  • 3.2.4.聽聽聽聽 Whether the unauthorized person or entity has a legal or contractual duty not to misuse the information;
  • 3.2.5.聽聽聽聽 Whether the PHI was actually acquired or viewed;
  • 3.2.6.聽聽聽聽 Whether electronic PHI was accessed, viewed, acquired, transferred or otherwise compromised;
  • 3.2.7.聽聽聽聽 The extent to which the risk to the PHI has been mitigated;
  • 3.2.8.聽聽聽聽 Whether there are past dealings with the recipient or other factors that would indicate that the recipient can be trusted not to use or further disclose the information; and
  • 3.2.9.聽聽聽聽 Other facts and circumstances that would indicate that the recipient of the information is unlikely to misuse the information;

4. Notice. If 泡芙视频 is notified of possible unauthorized PHI disclosure, it must evaluate notification requirements.

4.1.聽 If the Privacy Officer, in consultation with the Breach Notification Team, determines that a breach of unsecured PHI has occurred, the Privacy Officer shall notify the individual, the United States Department of Health and Human Services (HHS), and the media (if required) consistent with the below and applicable legal requirements. 聽Any notice provided pursuant to this Policy must be approved and directed by the Privacy Officer or their designee. No other 泡芙视频 personnel are authorized to provide such notice unless expressly directed by the Privacy Officer and/or 泡芙视频 Senior Administration Officials.

4.2.听 Notice to Individuals. 聽The Privacy Officer or their designee shall notify the affected individual(s) without unreasonable delay and in no case later than five University business days after 泡芙视频 discovers or is informed of the breach.

  • 4.2.1.聽聽聽聽 The notice shall be in plain language and include, when available: (1) a brief description of the breach incident (e.g., the date(s) of the breach and its discovery); (2) a description of the types of information affected (e.g., whether the breach involved names, social security numbers, birthdates, addresses, diagnoses, etc.); (3) steps that affected individuals should take to protect themselves from potential harm resulting from the breach; (4) a brief description of what 泡芙视频 is doing to investigate, mitigate, and protect against further harm or breaches; and (5) contact procedures for affected persons to ask questions and receive information, which shall include a toll-free telephone number, e-mail address, website, or postal address at which the person may obtain more information.
  • 4.2.2.听聽聽聽 The Privacy Officer or their designee shall notify the individual by first class mail to the individual鈥檚 last known address or, if the individual agrees, electronically.聽 The notice may be sent by one or more mailings as information is available.

4.3.听 Substitute Notice. If 泡芙视频 does not have sufficient contact information to provide direct, written notice to the individual, the Privacy Officer or their designee must use a substitute form of notice reasonably calculated to reach the individual.

4.4.听 Fewer than ten affected individuals. If there is insufficient contact information for fewer than ten affected individuals, the Privacy Officer or their designee shall provide an alternative form of written, telephone, e-mail, or other type of notice.

4.5.听 Ten or more affected individuals. If there is insufficient contact information for ten or more affected individuals, the Privacy Officer or their designee shall do one of the following after consulting with 泡芙视频 Administration:

  • 4.5.1.聽聽聽聽 Post a conspicuous notice on 泡芙视频鈥檚 and the Covered Unit鈥檚 [JMS1]聽website home page for 90 days with a hyperlink to the additional information required to be given to individuals as provided above; or publish a conspicuous notice in major print or broadcast media in the area where affected individuals may reside.
  • 4.5.2.聽聽聽聽 Notice must include a toll-free number that remains active for at least 90 days so individuals may call to learn whether their PHI was breached.

4.6.听 Immediate Notice. If the Privacy Officer believes that PHI is subject to imminent misuse, the Privacy Officer or their designee may, in addition to the written notice described above, provide immediate notice to the individual by telephone or other means.

4.7.听 Deceased Individual; Notice to Next of Kin. If the affected individual is deceased and 泡芙视频 knows the address for the individual鈥檚 next of kin or personal representative, the Privacy Officer or their designee shall mail the written notice described above to the next of kin or personal representative. If 泡芙视频 does not know the address for the next of kin or personal representative, 泡芙视频 is not required to provide such notice.

4.8.听 Notice to HHS. If the Privacy Officer determines that there was a breach of PHI, the Privacy Officer shall also notify HHS as described below.

  • 4.8.1.听听听听 Fewer than 500 Affected Individuals. If the breach involves PHI of fewer than 500 persons, the Privacy Officer may either (1) report the breach immediately to HHS, or (2) maintain a log of such breaches and submit the log to HHS annually within 60 days of the end of the calendar year as set forth on HHS鈥檚 website.
  • 4.8.2.听听听听 500 or More Affected Individuals. If the breach involves 500 or more individuals, the Privacy Officer shall notify HHS of the breach at the same time the Privacy Officer notifies the individual or next of kin. The Privacy Officer shall maintain and submit to HHS a log of breaches as set forth on HHS鈥 website.

4.9.听 Notice to Media. If a breach of PHI involves more than 500 residents in a state, 泡芙视频 will also notify prominent media outlets in such state. The notice shall be provided without unreasonable delay but no later than 60 days after discovery of the breach. The notice shall contain the same elements of information as required for the notice to the individual. The Privacy Officer shall work with 泡芙视频 Administration and 泡芙视频鈥檚 Office of Marketing and Strategic Communication to develop an appropriate press release.

4.10.听听听听听听听听听听听听听听听听 Notice from Business Associate. If 泡芙视频鈥檚 business associate discovers a breach of PHI, the business associate shall notify the Privacy Officer as set out in the Business Associate Agreement (BAA). The business associate shall, to the extent possible, identify each person whose information was breached and provide such other information 泡芙视频 requires to comply with this Policy.聽 Unless the Privacy Officer directs otherwise, the Privacy Officer or their designee shall provide the required notification.

4.11.听听听听听听听听听听听听听听听听 Notice where 泡芙视频 is the Business Associate

If 泡芙视频 is the Business Associate that made or discovered the breach, it will provide the covered entity or entities notice as set out in the applicable BAA and will cooperate with the Covered Entity as set forth in the applicable BAA.

4.12.听听听听听听听听听听听听听听听听 Delay of Notice Per Law Enforcement鈥檚 Request. Upon request from a law enforcement official, the Privacy Officer shall delay notice to the individual, HHS, and the media if the notice would impede a criminal investigation or threaten national security. If the law enforcement official鈥檚 statement is in writing and specifies the time for which the delay is required, the Privacy Officer shall delay the notice for the required time. If the official鈥檚 statement is verbal, the Privacy Officer shall document the statement and the identity of the official, and shall delay the notice for no more than 30 days from the date of the statement.

5. Training Employees The HIPAA Compliance Officer of each Health Care Component shall train its workforce members upon hire and annually thereafter concerning the University鈥檚 HIPAA Policy and these procedures, including members鈥 obligation to immediately report suspected violations.

6. Sanctions For employees, failure to follow this Policy and any associated procedures could lead to disciplinary action, up to and including dismissal from employment by the University, consistent with applicable procedures and Collective Bargaining Agreements.聽 For students, failure to follow this Policy could lead to sanctions under the Student Code, up to and including expulsion.聽

7. Documentation The Privacy Officer and Compliance Officer for the Covered Component shall prepare and maintain documentation required by this Policy for six years. 聽If the Privacy Officer and/or Compliance Officer for the Covered component make a determination regarding any of the criteria addressed in Sections Two, Three and Four of this Policy, documentation must include analysis and conclusions that led to any action or inaction on behalf of the University.

8. Mitigating Potential Breaches If 泡芙视频 personnel improperly access, acquire, use or disclose PHI and immediate action may cure or mitigate the effects of such use or disclosure, 泡芙视频 personnel should take such action. For example, if 泡芙视频 personnel improperly access or acquire PHI, they should immediately stop, close, and/or return the information.

9. Contact Information

Individuals who need to report a potential or suspected breach, or who have any questions about these procedures, should contact the 泡芙视频 Privacy Officer at:

1903 West Michigan Ave.

Kalamazoo, MI 49008

Ph: 269-387-1900

Toll free:聽 855-247-3145

Hipaa-officer@wmich.edu

References

42 C.F.R. Part 160

Special Publication 800-88, Guidelines for Media Sanitization