SlideShare a Scribd company logo
ONC Report Describes Privacy and Security Gaps at Non-HIPAA Covered Entities [Study]
Almost every individual on the Internet of Things (IOT) grid already has a copious amount of
personal data that stem from things like the monitoring of exercise, glucose levels, and personal
location and other movements, which are constantly added to the cloud on a daily basis. Even
small amounts of this information, according to a 2013 FTC report, could be indiscriminately
used to gain pricing advantages and also used to unfairly target certain demographic groups in
advertising and marketing campaigns. So, it’s more important than ever to be aware of the
number of ways that medical data can be used for inappropriate and unethical means in the
marketplace.
The oversight-gaps between HIPAA-covered entities that collect health data and those that
are not regulated by HIPAA poses risks to individuals who share their information electronically.
And these risks often outweigh the benefits of the virtual world and the Internet of Things.
The recent FTC report on IOT and privacy issues shed light on the various other ways that
information can potentially be compromised in the electronic age, with a lack of vigilance and
due diligence. The use of multiple “smart devices” often makes life easier and saves the modern
citizen a lot of valuable time and energy. But while it’s true that these “tools of convenience”
bring with them many positives, the use of devices such as wearable fitness and medical bands,
watches and monitors, home surveillance and security systems, appliance smart meters, and
GPS and transponder boxes, are also data transmitters that can jeopardize the privacy
concerns of HIPAA-related matters.
Since there no regulatory policies in place for these smart devices, the Universityof Miami’s
article from the Office of HIPAA Privacy and Security underscores some of these concerns
and raises questions as to how consumers can combat the risks that come with the collection of
enormous amounts of data stored by file and date sharing on sites such as Instagram, Google
Drive and Microsoft OneDrive, DropBox, search engines queries, and the ubiquitous social
media outlets. There is also the issue of how personal benefits can still compromise a much
larger societal problem of increased risk/benefit concerns that comes with trying to improve
health-care through data collection. Yes, consumers can take steps to maximize privacy
settings on their personal devices, but that still doesn’t address what regulatory policies, if any,
should be put into place to increase security measures for the user.
HIPAA’s Electronic Data Interchange Rule (EDI) “strictly govern(s) the way data is
electronically transferred from one computer to another,” and offers some hope for heightened
data security, but is highly technical and requires sophisticated understanding, possibly even
demanding the use of a consultant in some cases to achieve compliance with HIPAA standards.
Although the aim of EDI is to lighten the data reporting load in the healthcare industry, there are
still several factors that may determine whether or not you need to seek the advice of a
consultant in order to meet compliance standards: concerns regarding the use of intermediaries
for electronic claims versus a direct-pay method by the provider, and the overall acumen and
sophistication of in-house IT departments. EPI stresses that as long as a provider is in
compliance the methodology is discretionary when it comes to electronic transmission
procedures. But it still remains a vitally important consideration for issues facing the healthcare
industry’s privacy policies.
A little over a month ago, the HIPAA Journal reported on another recent report issued by the
ONC. The ONC concluded that the explosion of IOT has led to the collection of data by non-
HIPAA entities not subject to the regulatory policies of HIPAA, thus compromising the health
information of many individuals and placing them at risk for data theft and unwanted
disclosures. The report also points to a need for better education policies to increase public
awareness on what information is and is not protected under regulatory guidelines.
Moreover, data from a non-HIPAA-entity may not even be available to the individual upon
request, something that is an unquestionable right under HIPAA policies. And further, terms of
use, data terminologies, rights of use, and information about collection and dissemination of
limitations and third-party access are often vague, if not non-existent.
Though the report stresses the progress made in these areas from efforts to inform private
sectors of abuse, deception, and/or general malfeasance, the ONC still emphasizes the areas
where individuals may not be protected, even under HIPAA, if they are lax in self-disclosure
through such entities as social media platforms, or if they participate in self-pay boutique clinics
for medical services that are not subject to HIPAA.
But this leads to the larger point of a lack of public education policies which will ostensibly lead
to a greater understanding of what does or does not apply to individuals who utilize the
tremendous benefits of IOT. Marketers and advertisers may almost certainly balk at this. They’ll
cry that it hinders their ability to develop and contribute more and more beneficial commodities
for the overall public health issues and accompanying economic concerns over rising healthcare
costs. But even those that cater to the industry may not fully understand the implications and
ramifications of the long-term risks in healthcare and privacy issues that work from compliances
with HIPAA regulations.
The downside is that creativity and innovation may be thwarted for fear that industry regulatory
policies are too cumbersome and tedious to conform to. It is clear that some kind of federal
intervention needs to take place as technology continues to evolve.
Because the study found that lack of encryption and the lack of other general security
safeguards are currently the greatest threats to health information breaches, the ONC
recommendation is to strive to increase awareness and understanding of appropriate policies
(and the terms within), as well as greater restrictions regarding privacy-policy changes that
occur in tandem with the consumer’s permission--not mere Internet data tracking methods
without an informed consent.
Resource Links:
http://www.asha.org/practice/reimbursement/hipaa/hipaa_edi_faq/
http://www.hipaajournal.com/large-privacy-security-gaps-non-hipaa-covered-
entities-onc-report-3512/
http://privacyoffice.med.miami.edu/awareness/tips/the-internet-of-things-and-
privacy
https://www.healthit.gov/sites/default/files/reports/info_blocking_040915.pdf
https://www.ftc.gov/system/files/documents/reports/federal-trade-commission-
staff-report-november-2013-workshop-entitled-internet-things-
privacy/150127iotrpt.pdf
https://www.healthit.gov/sites/default/files/non-
covered_entities_report_june_17_2016.pdf
Meta: Health data is being collected by entities not covered by HIPAA regulations
and may be at risk—according to a recent report released by the ONR .
Keywords: health data, healthcare data privacy, healthcare data security,
healthcare information technology, ONR , HIPAA, non-HIPAA covered entities

More Related Content

PDF
Protecting Patient Health Information in the HITECH Era
PDF
IT Security in Higher Education
PDF
Rapid7 Report: Data Breaches in the Government Sector
PDF
Best Practices to Protect Cardholder Data Environment and Achieve PCI Compliance
PPTX
LAK16 privacy and analytics (2016)
PPT
Government Policy Needs in a Web 2.0 World
DOC
eBusinessinHealthcare_Final
DOCX
RIGHT PRACTICES IN DATA MANAGEMENT AND GOVERNANCE
Protecting Patient Health Information in the HITECH Era
IT Security in Higher Education
Rapid7 Report: Data Breaches in the Government Sector
Best Practices to Protect Cardholder Data Environment and Achieve PCI Compliance
LAK16 privacy and analytics (2016)
Government Policy Needs in a Web 2.0 World
eBusinessinHealthcare_Final
RIGHT PRACTICES IN DATA MANAGEMENT AND GOVERNANCE

What's hot (20)

PPT
Social & Ethical Issues in Information Systems
PPTX
Legal issues in technology
PPT
Priv&security&profin electrcommunicationsrev9 23
PDF
Hipaa omnibus
PDF
Research on Legal Protection of Data Rights of E Commerce Platform Operators
PDF
"Data Breaches & the Upcoming Data Protection Legal Framework: What’s the Buz...
PDF
Role-Based Access Governance and HIPAA Compliance: A Pragmatic Approach
 
PPTX
4 key technological trends that raise ethical issues
PDF
Privacy through Anonymisation in Large-scale Socio-technical Systems: The BIS...
PDF
Privacy trends 2011
PDF
Cybercrime and the Healthcare Industry
 
DOC
Energy Data Access_Who wants the data
PPTX
اخلاقيات الثاني
PDF
Data Privacy
PDF
Information governance a_necessity_in_to
PPT
PPT
Chapter 4
PDF
8MAN-Public_Sector_Data_and_Information_Security_Survey 2016
PDF
Research on Electronic Commerce Platform Consumer Data Rights and Legal Prote...
PPTX
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
Social & Ethical Issues in Information Systems
Legal issues in technology
Priv&security&profin electrcommunicationsrev9 23
Hipaa omnibus
Research on Legal Protection of Data Rights of E Commerce Platform Operators
"Data Breaches & the Upcoming Data Protection Legal Framework: What’s the Buz...
Role-Based Access Governance and HIPAA Compliance: A Pragmatic Approach
 
4 key technological trends that raise ethical issues
Privacy through Anonymisation in Large-scale Socio-technical Systems: The BIS...
Privacy trends 2011
Cybercrime and the Healthcare Industry
 
Energy Data Access_Who wants the data
اخلاقيات الثاني
Data Privacy
Information governance a_necessity_in_to
Chapter 4
8MAN-Public_Sector_Data_and_Information_Security_Survey 2016
Research on Electronic Commerce Platform Consumer Data Rights and Legal Prote...
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
Ad

Viewers also liked (13)

DOCX
PPTX
Tics evidencia 2
PPTX
Evidencia tics 1
PPTX
Tics evidencia 2
PPTX
Lord of the Flies Example Presentation
PDF
DOC
Marcus smith resume 11.16
DOCX
PPTX
Evidencia 2
PDF
Desarrollo formas de comunicasion
PDF
Empresa virtual (presentacion power point)
PDF
Building Successful Faculty Engagement Programs: March, 2016 webinar
PDF
Abundance-Inspirational Woman Magazine
Tics evidencia 2
Evidencia tics 1
Tics evidencia 2
Lord of the Flies Example Presentation
Marcus smith resume 11.16
Evidencia 2
Desarrollo formas de comunicasion
Empresa virtual (presentacion power point)
Building Successful Faculty Engagement Programs: March, 2016 webinar
Abundance-Inspirational Woman Magazine
Ad

Similar to ONR Blog 1 (20)

PDF
Constructing a HIPAA-compliant healthcare app from scratch
DOCX
Running head Information security threats 1Information secur.docx
DOCX
Sarah Kim HIPAA for Small Providers
PDF
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
PDF
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
PDF
Nicolas Terry, "Big Data, Regulatory Disruption, and Arbitrage in Health Care"
DOCX
Information Governance in the Healthcare Industry
PDF
Harnessing AI for Data Privacy through a Multidimensional Framework
PDF
Harnessing AI for Data Privacy through a Multidimensional Framework
PDF
HARNESSING AI FOR DATA PRIVACY THROUGH A MULTIDIMENSIONAL FRAMEWORK
PDF
HARNESSING AI FOR DATA PRIVACY THROUGH A MULTIDIMENSIONAL FRAMEWORK
DOCX
Running Head Stage 2 Sharing Data1Stage 2 Sharing Data3.docx
PPTX
Hipaa checklist for healthcare software
DOCX
HCAD_600_Paper1_Amer
DOCX
Hello Shreya,Detailed analysis of data breaches that occurred in
PPT
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECH
DOCX
POST EACH DISCUSSION SEPARATELYThe way patient data is harvested.docx
DOCX
Article 1 currently, smartphone, web, and social networking techno
DOCX
Make sure it is in APA 7 format and at least 3-4 paragraphs and refe.docx
Constructing a HIPAA-compliant healthcare app from scratch
Running head Information security threats 1Information secur.docx
Sarah Kim HIPAA for Small Providers
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Nicolas Terry, "Big Data, Regulatory Disruption, and Arbitrage in Health Care"
Information Governance in the Healthcare Industry
Harnessing AI for Data Privacy through a Multidimensional Framework
Harnessing AI for Data Privacy through a Multidimensional Framework
HARNESSING AI FOR DATA PRIVACY THROUGH A MULTIDIMENSIONAL FRAMEWORK
HARNESSING AI FOR DATA PRIVACY THROUGH A MULTIDIMENSIONAL FRAMEWORK
Running Head Stage 2 Sharing Data1Stage 2 Sharing Data3.docx
Hipaa checklist for healthcare software
HCAD_600_Paper1_Amer
Hello Shreya,Detailed analysis of data breaches that occurred in
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECH
POST EACH DISCUSSION SEPARATELYThe way patient data is harvested.docx
Article 1 currently, smartphone, web, and social networking techno
Make sure it is in APA 7 format and at least 3-4 paragraphs and refe.docx

ONR Blog 1

  • 1. ONC Report Describes Privacy and Security Gaps at Non-HIPAA Covered Entities [Study] Almost every individual on the Internet of Things (IOT) grid already has a copious amount of personal data that stem from things like the monitoring of exercise, glucose levels, and personal location and other movements, which are constantly added to the cloud on a daily basis. Even small amounts of this information, according to a 2013 FTC report, could be indiscriminately used to gain pricing advantages and also used to unfairly target certain demographic groups in advertising and marketing campaigns. So, it’s more important than ever to be aware of the number of ways that medical data can be used for inappropriate and unethical means in the marketplace. The oversight-gaps between HIPAA-covered entities that collect health data and those that are not regulated by HIPAA poses risks to individuals who share their information electronically. And these risks often outweigh the benefits of the virtual world and the Internet of Things. The recent FTC report on IOT and privacy issues shed light on the various other ways that information can potentially be compromised in the electronic age, with a lack of vigilance and due diligence. The use of multiple “smart devices” often makes life easier and saves the modern citizen a lot of valuable time and energy. But while it’s true that these “tools of convenience” bring with them many positives, the use of devices such as wearable fitness and medical bands, watches and monitors, home surveillance and security systems, appliance smart meters, and GPS and transponder boxes, are also data transmitters that can jeopardize the privacy concerns of HIPAA-related matters. Since there no regulatory policies in place for these smart devices, the Universityof Miami’s article from the Office of HIPAA Privacy and Security underscores some of these concerns and raises questions as to how consumers can combat the risks that come with the collection of enormous amounts of data stored by file and date sharing on sites such as Instagram, Google
  • 2. Drive and Microsoft OneDrive, DropBox, search engines queries, and the ubiquitous social media outlets. There is also the issue of how personal benefits can still compromise a much larger societal problem of increased risk/benefit concerns that comes with trying to improve health-care through data collection. Yes, consumers can take steps to maximize privacy settings on their personal devices, but that still doesn’t address what regulatory policies, if any, should be put into place to increase security measures for the user. HIPAA’s Electronic Data Interchange Rule (EDI) “strictly govern(s) the way data is electronically transferred from one computer to another,” and offers some hope for heightened data security, but is highly technical and requires sophisticated understanding, possibly even demanding the use of a consultant in some cases to achieve compliance with HIPAA standards. Although the aim of EDI is to lighten the data reporting load in the healthcare industry, there are still several factors that may determine whether or not you need to seek the advice of a consultant in order to meet compliance standards: concerns regarding the use of intermediaries for electronic claims versus a direct-pay method by the provider, and the overall acumen and sophistication of in-house IT departments. EPI stresses that as long as a provider is in compliance the methodology is discretionary when it comes to electronic transmission procedures. But it still remains a vitally important consideration for issues facing the healthcare industry’s privacy policies. A little over a month ago, the HIPAA Journal reported on another recent report issued by the ONC. The ONC concluded that the explosion of IOT has led to the collection of data by non- HIPAA entities not subject to the regulatory policies of HIPAA, thus compromising the health information of many individuals and placing them at risk for data theft and unwanted disclosures. The report also points to a need for better education policies to increase public awareness on what information is and is not protected under regulatory guidelines.
  • 3. Moreover, data from a non-HIPAA-entity may not even be available to the individual upon request, something that is an unquestionable right under HIPAA policies. And further, terms of use, data terminologies, rights of use, and information about collection and dissemination of limitations and third-party access are often vague, if not non-existent. Though the report stresses the progress made in these areas from efforts to inform private sectors of abuse, deception, and/or general malfeasance, the ONC still emphasizes the areas where individuals may not be protected, even under HIPAA, if they are lax in self-disclosure through such entities as social media platforms, or if they participate in self-pay boutique clinics for medical services that are not subject to HIPAA. But this leads to the larger point of a lack of public education policies which will ostensibly lead to a greater understanding of what does or does not apply to individuals who utilize the tremendous benefits of IOT. Marketers and advertisers may almost certainly balk at this. They’ll cry that it hinders their ability to develop and contribute more and more beneficial commodities for the overall public health issues and accompanying economic concerns over rising healthcare costs. But even those that cater to the industry may not fully understand the implications and ramifications of the long-term risks in healthcare and privacy issues that work from compliances with HIPAA regulations. The downside is that creativity and innovation may be thwarted for fear that industry regulatory policies are too cumbersome and tedious to conform to. It is clear that some kind of federal intervention needs to take place as technology continues to evolve. Because the study found that lack of encryption and the lack of other general security safeguards are currently the greatest threats to health information breaches, the ONC recommendation is to strive to increase awareness and understanding of appropriate policies (and the terms within), as well as greater restrictions regarding privacy-policy changes that
  • 4. occur in tandem with the consumer’s permission--not mere Internet data tracking methods without an informed consent. Resource Links: http://www.asha.org/practice/reimbursement/hipaa/hipaa_edi_faq/ http://www.hipaajournal.com/large-privacy-security-gaps-non-hipaa-covered- entities-onc-report-3512/ http://privacyoffice.med.miami.edu/awareness/tips/the-internet-of-things-and- privacy https://www.healthit.gov/sites/default/files/reports/info_blocking_040915.pdf https://www.ftc.gov/system/files/documents/reports/federal-trade-commission- staff-report-november-2013-workshop-entitled-internet-things- privacy/150127iotrpt.pdf https://www.healthit.gov/sites/default/files/non- covered_entities_report_june_17_2016.pdf Meta: Health data is being collected by entities not covered by HIPAA regulations and may be at risk—according to a recent report released by the ONR . Keywords: health data, healthcare data privacy, healthcare data security, healthcare information technology, ONR , HIPAA, non-HIPAA covered entities