bmad-plus 0.4.4 → 0.6.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +54 -0
- package/README.md +5 -3
- package/package.json +1 -1
- package/readme-international/README.de.md +2 -2
- package/readme-international/README.es.md +2 -2
- package/readme-international/README.fr.md +2 -2
- package/src/bmad-plus/module.yaml +76 -12
- package/src/bmad-plus/packs/pack-dev-studio/README.md +162 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/analysis/analyst-agent.md +74 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/analysis/document-project.md +62 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/analysis/domain-research.md +96 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/analysis/market-research.md +96 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/analysis/prfaq.md +135 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/analysis/product-brief.md +81 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/analysis/tech-writer-agent.md +74 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/analysis/technical-research.md +96 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/architect-agent.md +74 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/create-architecture.md +74 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/create-epics-stories.md +93 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/generate-project-context.md +81 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/implementation-readiness.md +91 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-01-init.md +153 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-01b-continue.md +173 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-02-context.md +224 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-03-starter.md +329 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-04-decisions.md +318 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-05-patterns.md +359 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-06-structure.md +379 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-07-validation.md +361 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/architecture/steps/step-08-complete.md +82 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/checkpoint-preview.md +68 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/code-review-steps/step-01-gather-context.md +85 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/code-review-steps/step-02-review.md +35 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/code-review-steps/step-03-triage.md +49 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/code-review-steps/step-04-present.md +132 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/code-review.md +90 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/correct-course.md +301 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/create-story.md +429 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/dev-agent.md +74 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/dev-story-checklist.md +80 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/dev-story.md +485 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/investigate.md +194 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/qa-e2e-tests.md +176 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/quick-dev.md +111 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/retrospective.md +1512 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/sprint-planning.md +299 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/implementation/sprint-status.md +297 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/planning/create-prd.md +30 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/planning/create-ux-design.md +75 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/planning/edit-prd.md +30 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/planning/pm-agent.md +74 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/planning/prd.md +90 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/planning/ux-designer-agent.md +74 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/planning/validate-prd.md +30 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/advanced-elicitation.md +142 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/adversarial-review.md +37 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/bmad-help.md +75 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/brainstorming.md +6 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/customize.md +111 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/distillator.md +177 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/edge-case-hunter.md +67 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/editorial-review-prose.md +86 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/editorial-review-structure.md +179 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/index-docs.md +66 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/party-mode.md +128 -0
- package/src/bmad-plus/packs/pack-dev-studio/categories/utilities/shard-doc.md +105 -0
- package/src/bmad-plus/packs/pack-dev-studio/dev-studio-orchestrator.md +120 -0
- package/src/bmad-plus/packs/pack-dev-studio/shared/architecture-decision-template.md +12 -0
- package/src/bmad-plus/packs/pack-dev-studio/shared/bwml-spec.md +328 -0
- package/src/bmad-plus/packs/pack-dev-studio/shared/module-help.csv +32 -0
- package/src/bmad-plus/packs/pack-dev-studio/upstream-sync.yaml +81 -0
- package/src/bmad-plus/packs/pack-shield/README.md +110 -0
- package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/csrd-agent.md +262 -0
- package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/section508-agent.md +179 -0
- package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/wcag-agent.md +201 -0
- package/src/bmad-plus/packs/pack-shield/categories/ai-governance/eu-ai-act-agent.md +97 -0
- package/src/bmad-plus/packs/pack-shield/categories/ai-governance/iso42001-agent.md +251 -0
- package/src/bmad-plus/packs/pack-shield/categories/ai-governance/nist-ai-rmf-agent.md +133 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/cis-controls-agent.md +221 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/ism-agent.md +150 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/iso27001-agent.md +167 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nis2-agent.md +83 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nist-800-53-agent.md +250 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nist-csf-agent.md +218 -0
- package/src/bmad-plus/packs/pack-shield/categories/data-privacy/ccpa-agent.md +94 -0
- package/src/bmad-plus/packs/pack-shield/categories/data-privacy/dpdpa-agent.md +136 -0
- package/src/bmad-plus/packs/pack-shield/categories/data-privacy/gdpr-agent.md +296 -0
- package/src/bmad-plus/packs/pack-shield/categories/data-privacy/iso27701-agent.md +134 -0
- package/src/bmad-plus/packs/pack-shield/categories/data-privacy/lgpd-agent.md +129 -0
- package/src/bmad-plus/packs/pack-shield/categories/defense-export/cmmc-agent.md +127 -0
- package/src/bmad-plus/packs/pack-shield/categories/defense-export/ear-agent.md +272 -0
- package/src/bmad-plus/packs/pack-shield/categories/defense-export/itar-agent.md +202 -0
- package/src/bmad-plus/packs/pack-shield/categories/defense-export/tsa-agent.md +367 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/dora-agent.md +510 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/fedramp-agent.md +247 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/hipaa-agent.md +173 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/pci-dss-agent.md +239 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/soc2-agent.md +266 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/swift-csp-agent.md +164 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-classifier.md +131 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-fria.md +155 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-incidents.md +187 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-roles.md +113 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/breach-sentinel.md +197 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/cookie-policy-gen.md +180 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/dpia-sentinel.md +235 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/legitimate-interest.md +159 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-advisor.md +133 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-notice-gen.md +160 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-policy-gen.md +135 -0
- package/src/bmad-plus/packs/pack-shield/references/ccpa/ccpa-gdpr-comparison.md +117 -0
- package/src/bmad-plus/packs/pack-shield/references/ccpa/consumer-rights-workflows.md +177 -0
- package/src/bmad-plus/packs/pack-shield/references/cis-controls/framework-mappings.md +162 -0
- package/src/bmad-plus/packs/pack-shield/references/cis-controls/implementation-guidance.md +235 -0
- package/src/bmad-plus/packs/pack-shield/references/cis-controls/safeguards-detail.md +252 -0
- package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-assessment.md +170 -0
- package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-levels.md +113 -0
- package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-practices.md +211 -0
- package/src/bmad-plus/packs/pack-shield/references/csrd/compliance-program.md +281 -0
- package/src/bmad-plus/packs/pack-shield/references/csrd/double-materiality.md +253 -0
- package/src/bmad-plus/packs/pack-shield/references/csrd/esrs-standards.md +401 -0
- package/src/bmad-plus/packs/pack-shield/references/dora/article-reference.md +441 -0
- package/src/bmad-plus/packs/pack-shield/references/dora/incident-classification.md +297 -0
- package/src/bmad-plus/packs/pack-shield/references/dora/rts-its-guide.md +306 -0
- package/src/bmad-plus/packs/pack-shield/references/dora/third-party-risk.md +349 -0
- package/src/bmad-plus/packs/pack-shield/references/dpdpa/gdpr-comparison.md +173 -0
- package/src/bmad-plus/packs/pack-shield/references/dpdpa/rights-and-obligations.md +426 -0
- package/src/bmad-plus/packs/pack-shield/references/dpdpa/rules-2025.md +599 -0
- package/src/bmad-plus/packs/pack-shield/references/dpdpa/sections-reference.md +319 -0
- package/src/bmad-plus/packs/pack-shield/references/ear/ccl-eccn-guide.md +250 -0
- package/src/bmad-plus/packs/pack-shield/references/ear/compliance-program.md +280 -0
- package/src/bmad-plus/packs/pack-shield/references/ear/license-exceptions.md +207 -0
- package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/gpai-governance.md +267 -0
- package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/obligations-high-risk.md +287 -0
- package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/risk-classification.md +182 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/appendices-guide.md +209 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/control-families.md +281 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/poam-guide.md +93 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/readiness-checklist.md +134 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/sap-sar-guide.md +86 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/ssp-guide.md +129 -0
- package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/documents.md +192 -0
- package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/dpa-template.md +121 -0
- package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/privacy-notice.md +87 -0
- package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/breach-notification.md +293 -0
- package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/privacy-rule.md +276 -0
- package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/security-rule.md +299 -0
- package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/templates.md +568 -0
- package/src/bmad-plus/packs/pack-shield/references/ism/control-applicability.md +181 -0
- package/src/bmad-plus/packs/pack-shield/references/ism/guidelines-overview.md +183 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27001/annex-a-2013.md +203 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27001/annex-a-2022.md +132 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27001/control-mapping.md +153 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27701/annex-a-controls.md +195 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27701/regulatory-mapping.md +229 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27701/transition-guide.md +219 -0
- package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-ai-risk-assessment.md +258 -0
- package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-clauses-requirements.md +279 -0
- package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-controls-annex-a.md +155 -0
- package/src/bmad-plus/packs/pack-shield/references/itar/compliance-program.md +174 -0
- package/src/bmad-plus/packs/pack-shield/references/itar/licensing-guide.md +146 -0
- package/src/bmad-plus/packs/pack-shield/references/itar/usml-categories.md +93 -0
- package/src/bmad-plus/packs/pack-shield/references/lgpd/anpd-enforcement.md +147 -0
- package/src/bmad-plus/packs/pack-shield/references/lgpd/compliance-program.md +272 -0
- package/src/bmad-plus/packs/pack-shield/references/lgpd/lgpd-articles.md +271 -0
- package/src/bmad-plus/packs/pack-shield/references/nis2/article-21-measures.md +153 -0
- package/src/bmad-plus/packs/pack-shield/references/nis2/iso27001-nis2-mapping.md +68 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-800-53/assessment-rmf.md +349 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-800-53/baselines-tailoring.md +277 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-800-53/control-families.md +450 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-ai-rmf/rmf-core.md +361 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-ai-rmf/rmf-profiles.md +192 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-10-to-20-mapping.md +143 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-20-functions-categories.md +278 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-implementation-tiers.md +135 -0
- package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-requirements.md +366 -0
- package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-saq-guide.md +217 -0
- package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-v4-changes.md +190 -0
- package/src/bmad-plus/packs/pack-shield/references/section-508/wcag-mapping.md +160 -0
- package/src/bmad-plus/packs/pack-shield/references/soc2/controls.md +241 -0
- package/src/bmad-plus/packs/pack-shield/references/soc2/evidence.md +236 -0
- package/src/bmad-plus/packs/pack-shield/references/soc2/policies.md +254 -0
- package/src/bmad-plus/packs/pack-shield/references/soc2/vendor.md +276 -0
- package/src/bmad-plus/packs/pack-shield/references/swift-csp/swift-assessment.md +202 -0
- package/src/bmad-plus/packs/pack-shield/references/swift-csp/swift-controls.md +545 -0
- package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-crmp-requirements.md +359 -0
- package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-directives-overview.md +187 -0
- package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-incident-reporting.md +187 -0
- package/src/bmad-plus/packs/pack-shield/references/wcag/criteria-detail.md +510 -0
- package/src/bmad-plus/packs/pack-shield/shared/audit-report-template.md +103 -0
- package/src/bmad-plus/packs/pack-shield/shared/cross-framework-mapper.md +103 -0
- package/src/bmad-plus/packs/pack-shield/shared/gap-analysis-template.md +83 -0
- package/src/bmad-plus/packs/pack-shield/shield-orchestrator.md +229 -0
- package/src/bmad-plus/packs/pack-shield/upstream-sync.yaml +68 -0
- package/tools/cli/commands/install.js +31 -9
- package/tools/cli/commands/update.js +4 -2
- package/tools/cli/i18n.js +50 -10
|
@@ -0,0 +1,293 @@
|
|
|
1
|
+
# HIPAA Breach Notification Rule Reference
|
|
2
|
+
## 45 CFR Part 164, Subpart D (HITECH / 2009)
|
|
3
|
+
|
|
4
|
+
---
|
|
5
|
+
|
|
6
|
+
## Table of Contents
|
|
7
|
+
1. [What is a Breach?](#1-what-is-a-breach)
|
|
8
|
+
2. [Breach Risk Assessment (4-Factor Test)](#2-breach-risk-assessment-4-factor-test)
|
|
9
|
+
3. [Notification to Individuals](#3-notification-to-individuals)
|
|
10
|
+
4. [Notification to HHS](#4-notification-to-hhs)
|
|
11
|
+
5. [Notification to Media](#5-notification-to-media)
|
|
12
|
+
6. [Business Associate Obligations](#6-business-associate-obligations)
|
|
13
|
+
7. [Documentation Requirements](#7-documentation-requirements)
|
|
14
|
+
8. [Penalties & Enforcement](#8-penalties--enforcement)
|
|
15
|
+
9. [Breach Response Workflow](#9-breach-response-workflow)
|
|
16
|
+
10. [Common Breach Scenarios](#10-common-breach-scenarios)
|
|
17
|
+
|
|
18
|
+
---
|
|
19
|
+
|
|
20
|
+
## 1. What is a Breach?
|
|
21
|
+
|
|
22
|
+
### Definition (§164.402):
|
|
23
|
+
A **breach** is the acquisition, access, use, or disclosure of PHI in a manner not permitted under the Privacy Rule that compromises the security or privacy of the PHI.
|
|
24
|
+
|
|
25
|
+
### Three Exceptions — These Are NOT Breaches:
|
|
26
|
+
1. **Unintentional access** by workforce member acting in good faith within scope of authority — if no further use/disclosure
|
|
27
|
+
2. **Inadvertent disclosure** between authorized persons at the CE/BA — if no further use/disclosure
|
|
28
|
+
3. **Good faith belief** that unauthorized person who received PHI could not have retained it (e.g., misdirected fax that was immediately returned/destroyed)
|
|
29
|
+
|
|
30
|
+
### Presumption:
|
|
31
|
+
**Assume it's a breach unless the CE/BA demonstrates low probability that PHI has been compromised** using the 4-Factor Risk Assessment.
|
|
32
|
+
|
|
33
|
+
---
|
|
34
|
+
|
|
35
|
+
## 2. Breach Risk Assessment (4-Factor Test)
|
|
36
|
+
### §164.402(2)
|
|
37
|
+
|
|
38
|
+
To rebut the presumption of a breach, document a risk assessment considering:
|
|
39
|
+
|
|
40
|
+
### Factor 1: Nature and Extent of PHI Involved
|
|
41
|
+
- What types of identifiers were included?
|
|
42
|
+
- Was financial information involved (SSN, credit card, bank account)?
|
|
43
|
+
- Was clinical information included (diagnosis, treatment, medication)?
|
|
44
|
+
- Higher sensitivity = higher likelihood of compromise
|
|
45
|
+
|
|
46
|
+
### Factor 2: Who Unauthorized Person Was
|
|
47
|
+
- Was it another CE or BA (who would understand privacy obligations)?
|
|
48
|
+
- Was it a member of the public?
|
|
49
|
+
- Was it a malicious actor vs. inadvertent recipient?
|
|
50
|
+
- Known or unknown recipient?
|
|
51
|
+
|
|
52
|
+
### Factor 3: Whether PHI Was Actually Acquired or Viewed
|
|
53
|
+
- Did the unauthorized person actually access the information?
|
|
54
|
+
- Was the email read? Was the USB drive opened?
|
|
55
|
+
- Technical evidence (email delivery receipts, server logs)?
|
|
56
|
+
- Attestation from recipient that they did not view/retain?
|
|
57
|
+
|
|
58
|
+
### Factor 4: Extent to Which Risk Has Been Mitigated
|
|
59
|
+
- Was the PHI retrieved/destroyed?
|
|
60
|
+
- Did recipient sign a confidentiality agreement?
|
|
61
|
+
- Did recipient provide credible assurance of destruction?
|
|
62
|
+
|
|
63
|
+
### Assessment Outcome:
|
|
64
|
+
- **Low probability of compromise** → Not a reportable breach (document your reasoning thoroughly)
|
|
65
|
+
- **Cannot demonstrate low probability** → Treat as reportable breach
|
|
66
|
+
|
|
67
|
+
> **Important**: HHS scrutinizes risk assessments. Document contemporaneously, thoroughly, and honestly. A weak or post-hoc justification is worse than treating the incident as a breach.
|
|
68
|
+
|
|
69
|
+
### Safe Harbor — Encryption:
|
|
70
|
+
If PHI was **encrypted** using NIST-approved methods AND the encryption key was not also compromised → **Not a reportable breach** (§164.402(2) exception).
|
|
71
|
+
- Acceptable: AES-128+, NIST FIPS 140-2 validated
|
|
72
|
+
- Must maintain documentation of encryption
|
|
73
|
+
|
|
74
|
+
---
|
|
75
|
+
|
|
76
|
+
## 3. Notification to Individuals
|
|
77
|
+
### §164.404
|
|
78
|
+
|
|
79
|
+
### Timeline:
|
|
80
|
+
**Without unreasonable delay AND within 60 calendar days** of discovery of the breach.
|
|
81
|
+
|
|
82
|
+
Discovery = when CE/BA knew or should have known of the breach (not when investigation concludes).
|
|
83
|
+
|
|
84
|
+
### Method:
|
|
85
|
+
- **First choice**: Written notice by **first-class mail** to last known address
|
|
86
|
+
- **If email on file and individual agreed to electronic notice**: Email acceptable
|
|
87
|
+
- **If contact info insufficient or out-of-date** (10+ individuals): Substitute notice:
|
|
88
|
+
- Prominent posting on website homepage for 90 days + toll-free number, OR
|
|
89
|
+
- Major print/broadcast media in affected area
|
|
90
|
+
- **Urgent situations** (imminent misuse risk): Phone or other means in addition to written notice
|
|
91
|
+
|
|
92
|
+
### Required Content of Individual Notice (§164.404(c)):
|
|
93
|
+
1. Brief description of what happened (date of breach, date of discovery if known)
|
|
94
|
+
2. Description of types of PHI involved
|
|
95
|
+
3. Steps individuals should take to protect themselves
|
|
96
|
+
4. Brief description of what CE is doing to investigate, mitigate, and prevent recurrence
|
|
97
|
+
5. Contact info (toll-free number, email, website, or postal address)
|
|
98
|
+
|
|
99
|
+
---
|
|
100
|
+
|
|
101
|
+
## 4. Notification to HHS
|
|
102
|
+
### §164.408
|
|
103
|
+
|
|
104
|
+
### Timeline Depends on Breach Size:
|
|
105
|
+
|
|
106
|
+
| Affected Individuals | HHS Notification Deadline |
|
|
107
|
+
|---------------------|--------------------------|
|
|
108
|
+
| **500 or more** in a state/jurisdiction | **Simultaneously with individual notice** (within 60 days of discovery) |
|
|
109
|
+
| **Fewer than 500** | **Annual log** — submit within 60 days after end of calendar year |
|
|
110
|
+
|
|
111
|
+
### How to Submit:
|
|
112
|
+
- HHS Breach Reporting Portal: www.hhs.gov/hipaa/for-professionals/breach-notification/
|
|
113
|
+
- Breaches of 500+ are posted on HHS "Wall of Shame" (public)
|
|
114
|
+
|
|
115
|
+
### Required Information for HHS Report:
|
|
116
|
+
- Name of CE
|
|
117
|
+
- Contact information
|
|
118
|
+
- Type of breach (theft, loss, unauthorized access/disclosure, hacking, improper disposal, other)
|
|
119
|
+
- Location of breached information (laptop, paper, EHR, email, other)
|
|
120
|
+
- Number of individuals affected
|
|
121
|
+
- Date of breach
|
|
122
|
+
- Date of discovery
|
|
123
|
+
- Description of PHI types involved
|
|
124
|
+
- Description of safeguards in place
|
|
125
|
+
- Actions taken in response
|
|
126
|
+
|
|
127
|
+
---
|
|
128
|
+
|
|
129
|
+
## 5. Notification to Media
|
|
130
|
+
### §164.406
|
|
131
|
+
|
|
132
|
+
### Required When:
|
|
133
|
+
Breach affects **500 or more residents** of a **state or jurisdiction**.
|
|
134
|
+
|
|
135
|
+
### Timeline:
|
|
136
|
+
Without unreasonable delay and within **60 calendar days** of discovery.
|
|
137
|
+
|
|
138
|
+
### Method:
|
|
139
|
+
Notify prominent media outlets serving the affected state/jurisdiction (e.g., major newspaper, TV station).
|
|
140
|
+
|
|
141
|
+
### Content:
|
|
142
|
+
Same as individual notification content.
|
|
143
|
+
|
|
144
|
+
> Note: Media notification is IN ADDITION to individual and HHS notification — not a substitute.
|
|
145
|
+
|
|
146
|
+
---
|
|
147
|
+
|
|
148
|
+
## 6. Business Associate Obligations
|
|
149
|
+
### §164.410
|
|
150
|
+
|
|
151
|
+
### BA Must Notify CE:
|
|
152
|
+
- **Without unreasonable delay** and within **60 calendar days** of discovery
|
|
153
|
+
- BA discovery = when any employee, officer, or agent of BA knows (or should know)
|
|
154
|
+
|
|
155
|
+
### What BA Must Provide to CE:
|
|
156
|
+
- Identity of each individual affected (if known)
|
|
157
|
+
- All information needed for CE to provide required notifications
|
|
158
|
+
|
|
159
|
+
### CE Remains Responsible:
|
|
160
|
+
- The CE must send notifications to individuals, HHS, and media
|
|
161
|
+
- CE's 60-day clock runs from CE's discovery OR BA's notification (whichever is earlier)
|
|
162
|
+
- CE and BA should establish clear breach notification obligations in BAA
|
|
163
|
+
|
|
164
|
+
### BA-to-Subcontractor:
|
|
165
|
+
- Subcontractors of BAs must notify the BA (same timeline)
|
|
166
|
+
- Chain of notification flows up: Subcontractor → BA → CE
|
|
167
|
+
|
|
168
|
+
---
|
|
169
|
+
|
|
170
|
+
## 7. Documentation Requirements
|
|
171
|
+
### §164.414
|
|
172
|
+
|
|
173
|
+
### Must Maintain Documentation of:
|
|
174
|
+
- Risk assessments for incidents (justifying breach vs. non-breach determination)
|
|
175
|
+
- All notifications sent (copies)
|
|
176
|
+
- Dates notifications were sent
|
|
177
|
+
- Substitute notice postings
|
|
178
|
+
- HHS reports submitted
|
|
179
|
+
- Media notifications
|
|
180
|
+
|
|
181
|
+
### Retention: 6 years from creation or last effective date
|
|
182
|
+
|
|
183
|
+
### Best Practice — Incident Log:
|
|
184
|
+
Maintain a running log of all security incidents (whether or not they rise to reportable breach level). Useful for:
|
|
185
|
+
- Demonstrating Security Rule compliance (§164.308(a)(6))
|
|
186
|
+
- Pattern identification
|
|
187
|
+
- HHS investigations
|
|
188
|
+
- Annual HHS small breach reporting
|
|
189
|
+
|
|
190
|
+
---
|
|
191
|
+
|
|
192
|
+
## 8. Penalties & Enforcement
|
|
193
|
+
### HITECH / §160.404
|
|
194
|
+
|
|
195
|
+
### Civil Money Penalties (CMPs):
|
|
196
|
+
|
|
197
|
+
| Violation Category | Per Violation | Calendar Year Cap |
|
|
198
|
+
|-------------------|--------------|-------------------|
|
|
199
|
+
| Did not know (reasonable diligence) | $137 – $68,928 | $2,067,813 |
|
|
200
|
+
| Reasonable cause (not willful neglect) | $1,379 – $68,928 | $2,067,813 |
|
|
201
|
+
| Willful neglect — corrected | $13,785 – $68,928 | $2,067,813 |
|
|
202
|
+
| Willful neglect — not corrected | $68,928 – $2,067,813 | $2,067,813 |
|
|
203
|
+
|
|
204
|
+
> Note: Penalty amounts are adjusted annually for inflation (figures above are approximate 2024 levels).
|
|
205
|
+
|
|
206
|
+
### Criminal Penalties (§1320d-6):
|
|
207
|
+
- Knowingly obtaining/disclosing PHI: Up to $50,000 + 1 year imprisonment
|
|
208
|
+
- Under false pretenses: Up to $100,000 + 5 years
|
|
209
|
+
- With intent to sell/transfer/use for commercial advantage: Up to $250,000 + 10 years
|
|
210
|
+
|
|
211
|
+
### State Attorneys General:
|
|
212
|
+
- May bring civil actions for HIPAA violations on behalf of state residents
|
|
213
|
+
- May obtain $100/violation, up to $25,000/year per violation category (pre-inflation)
|
|
214
|
+
|
|
215
|
+
### HHS Enforcement Priorities (Historical):
|
|
216
|
+
- Risk analysis failures (most common)
|
|
217
|
+
- Access control deficiencies
|
|
218
|
+
- Insufficient encryption (not implementing addressable standard)
|
|
219
|
+
- Business Associate Agreement failures
|
|
220
|
+
- Insufficient audit logging
|
|
221
|
+
- Failure to timely notify of breaches
|
|
222
|
+
|
|
223
|
+
---
|
|
224
|
+
|
|
225
|
+
## 9. Breach Response Workflow
|
|
226
|
+
|
|
227
|
+
```
|
|
228
|
+
INCIDENT DETECTED
|
|
229
|
+
│
|
|
230
|
+
▼
|
|
231
|
+
STEP 1: CONTAINMENT (Immediate)
|
|
232
|
+
- Isolate affected systems
|
|
233
|
+
- Preserve evidence (logs, screenshots)
|
|
234
|
+
- Prevent further unauthorized access
|
|
235
|
+
- Assign incident response team
|
|
236
|
+
│
|
|
237
|
+
▼
|
|
238
|
+
STEP 2: INVESTIGATION (Days 1-14)
|
|
239
|
+
- What PHI was involved? (types, quantity)
|
|
240
|
+
- When did breach occur? When discovered?
|
|
241
|
+
- Who was affected (individuals)?
|
|
242
|
+
- How did breach occur?
|
|
243
|
+
- Was encryption in place?
|
|
244
|
+
│
|
|
245
|
+
▼
|
|
246
|
+
STEP 3: RISK ASSESSMENT (Days 1-30)
|
|
247
|
+
- Apply 4-Factor Test (see Section 2)
|
|
248
|
+
- Document analysis contemporaneously
|
|
249
|
+
- Determine: Reportable Breach or Not?
|
|
250
|
+
│
|
|
251
|
+
├─ NOT A BREACH ──→ Document findings; close incident; review safeguards
|
|
252
|
+
│
|
|
253
|
+
▼
|
|
254
|
+
STEP 4: IF REPORTABLE BREACH
|
|
255
|
+
│
|
|
256
|
+
├─ Notify INDIVIDUALS within 60 days of discovery
|
|
257
|
+
├─ Notify HHS:
|
|
258
|
+
│ ├─ 500+ affected: Within 60 days of discovery
|
|
259
|
+
│ └─ <500 affected: Add to annual log; report by Mar 1 of following year
|
|
260
|
+
└─ Notify MEDIA if 500+ residents in a state/jurisdiction
|
|
261
|
+
│
|
|
262
|
+
▼
|
|
263
|
+
STEP 5: REMEDIATION
|
|
264
|
+
- Address root cause
|
|
265
|
+
- Enhance safeguards
|
|
266
|
+
- Update policies/procedures
|
|
267
|
+
- Retrain workforce
|
|
268
|
+
- Update Risk Analysis
|
|
269
|
+
│
|
|
270
|
+
▼
|
|
271
|
+
STEP 6: DOCUMENTATION
|
|
272
|
+
- Incident report with all details
|
|
273
|
+
- Risk assessment documentation
|
|
274
|
+
- Copies of all notifications sent
|
|
275
|
+
- Remediation steps taken
|
|
276
|
+
```
|
|
277
|
+
|
|
278
|
+
---
|
|
279
|
+
|
|
280
|
+
## 10. Common Breach Scenarios
|
|
281
|
+
|
|
282
|
+
| Scenario | Breach? | Key Considerations |
|
|
283
|
+
|----------|---------|-------------------|
|
|
284
|
+
| Laptop with unencrypted PHI stolen | **Yes** (unless risk assessment rebuts) | Encryption safe harbor doesn't apply; document risk assessment |
|
|
285
|
+
| Encrypted laptop stolen | **Likely not** | Confirm encryption was FIPS 140-2 compliant; document |
|
|
286
|
+
| Email with PHI sent to wrong patient | **Risk assess** | Did recipient view it? Can they be contacted to confirm deletion? |
|
|
287
|
+
| PHI mailed to wrong address | **Risk assess** | Was it returned unopened? Could recipient have retained it? |
|
|
288
|
+
| Employee snoops on celebrity patient records | **Yes** | Workforce members are authorized users but this is impermissible access |
|
|
289
|
+
| Ransomware encrypts ePHI | **Likely yes** | Access/acquisition occurred; must conduct risk assessment; difficult to rebut |
|
|
290
|
+
| Vendor (BA) has breach | **Yes** | BA must notify CE; CE must notify individuals within 60 days |
|
|
291
|
+
| PHI posted on social media by employee | **Yes** | Impermissible disclosure; high severity |
|
|
292
|
+
| Paper PHI left in unsecured area briefly | **Risk assess** | Was it accessed? By whom? Mitigated? |
|
|
293
|
+
| Verbal disclosure of PHI to wrong party | **Privacy Rule** (not Security Rule) | Breach Notification applies to PHI broadly, not just ePHI |
|
|
@@ -0,0 +1,276 @@
|
|
|
1
|
+
# HIPAA Privacy Rule Reference
|
|
2
|
+
## 45 CFR Part 164, Subparts A and E
|
|
3
|
+
|
|
4
|
+
---
|
|
5
|
+
|
|
6
|
+
## Table of Contents
|
|
7
|
+
1. [Applicability & Scope](#1-applicability--scope)
|
|
8
|
+
2. [Uses and Disclosures — General Rules](#2-uses-and-disclosures--general-rules)
|
|
9
|
+
3. [Permitted Uses Without Authorization](#3-permitted-uses-without-authorization)
|
|
10
|
+
4. [Patient Rights](#4-patient-rights)
|
|
11
|
+
5. [Notice of Privacy Practices (NPP)](#5-notice-of-privacy-practices-npp)
|
|
12
|
+
6. [Minimum Necessary Standard](#6-minimum-necessary-standard)
|
|
13
|
+
7. [Authorization Requirements](#7-authorization-requirements)
|
|
14
|
+
8. [Special Categories of PHI](#8-special-categories-of-phi)
|
|
15
|
+
9. [Administrative Requirements](#9-administrative-requirements)
|
|
16
|
+
10. [Marketing & Fundraising](#10-marketing--fundraising)
|
|
17
|
+
|
|
18
|
+
---
|
|
19
|
+
|
|
20
|
+
## 1. Applicability & Scope
|
|
21
|
+
|
|
22
|
+
**Covered Entities (CEs)** subject to Privacy Rule:
|
|
23
|
+
- Health plans (insurance companies, HMOs, employer-sponsored plans with 50+ participants)
|
|
24
|
+
- Healthcare clearinghouses
|
|
25
|
+
- Healthcare providers who transmit health information electronically
|
|
26
|
+
|
|
27
|
+
**Business Associates (BAs):**
|
|
28
|
+
- Entities that create, receive, maintain, or transmit PHI on behalf of a CE
|
|
29
|
+
- Must sign a **Business Associate Agreement (BAA)** before PHI is shared
|
|
30
|
+
- Subject to Security Rule; portions of Privacy Rule apply via BAA
|
|
31
|
+
|
|
32
|
+
**PHI Definition** (§164.501):
|
|
33
|
+
Protected Health Information = health information that:
|
|
34
|
+
- Is created or received by a CE/BA
|
|
35
|
+
- Relates to past/present/future physical or mental health condition, healthcare provision, or payment
|
|
36
|
+
- Identifies or could reasonably identify the individual
|
|
37
|
+
|
|
38
|
+
**Does NOT apply to:**
|
|
39
|
+
- Employers acting in their employer capacity
|
|
40
|
+
- Life insurers (unless also a health plan)
|
|
41
|
+
- Workers' comp carriers (in most states, not subject to HIPAA directly)
|
|
42
|
+
- Education records (FERPA applies instead)
|
|
43
|
+
|
|
44
|
+
---
|
|
45
|
+
|
|
46
|
+
## 2. Uses and Disclosures — General Rules
|
|
47
|
+
|
|
48
|
+
### General Prohibition (§164.502(a))
|
|
49
|
+
A CE/BA may not use or disclose PHI except as permitted or required by the Privacy Rule.
|
|
50
|
+
|
|
51
|
+
### Required Disclosures (§164.502(a)(2))
|
|
52
|
+
- To the **individual** (upon request for access or accounting)
|
|
53
|
+
- To **HHS** for compliance investigations/enforcement
|
|
54
|
+
|
|
55
|
+
### Consent vs. Authorization vs. Agreement
|
|
56
|
+
| Mechanism | When Required | Notes |
|
|
57
|
+
|-----------|--------------|-------|
|
|
58
|
+
| Written Authorization | Uses/disclosures beyond TPO, marketing, sale of PHI | Must meet §164.508 requirements |
|
|
59
|
+
| Opportunity to agree/object | Facility directories, to family/friends involved in care | Informal; oral ok |
|
|
60
|
+
| No permission needed | TPO, public health, law enforcement (limited), etc. | See §164.512 |
|
|
61
|
+
|
|
62
|
+
---
|
|
63
|
+
|
|
64
|
+
## 3. Permitted Uses Without Authorization
|
|
65
|
+
|
|
66
|
+
### Treatment, Payment, Operations (TPO) (§164.506)
|
|
67
|
+
- **Treatment**: Providing, coordinating, managing healthcare
|
|
68
|
+
- **Payment**: Billing, claims processing, utilization review
|
|
69
|
+
- **Operations**: Quality assessment, training, auditing, legal, business planning
|
|
70
|
+
|
|
71
|
+
### Other Permitted Disclosures (§164.512)
|
|
72
|
+
| Purpose | Requirements |
|
|
73
|
+
|---------|-------------|
|
|
74
|
+
| Public health (§164.512(b)) | To authorized public health authorities |
|
|
75
|
+
| Abuse/neglect reporting (§164.512(c)) | To government authorities authorized to receive |
|
|
76
|
+
| Health oversight (§164.512(d)) | Audits, inspections, licensure by oversight agencies |
|
|
77
|
+
| Judicial/administrative (§164.512(e)) | Court order or subpoena with satisfactory assurance |
|
|
78
|
+
| Law enforcement (§164.512(f)) | Limited; specific conditions apply (e.g., court order, crime on premises) |
|
|
79
|
+
| Research (§164.512(i)) | With IRB/Privacy Board waiver or individual authorization |
|
|
80
|
+
| Serious threat (§164.512(j)) | To prevent imminent serious harm to individual or others |
|
|
81
|
+
| Workers' comp (§164.512(l)) | As authorized by workers' comp laws |
|
|
82
|
+
| Decedents (§164.512(g)) | To coroners, medical examiners, funeral directors |
|
|
83
|
+
| Limited data set (§164.514(e)) | Remove direct identifiers; require Data Use Agreement (DUA) |
|
|
84
|
+
|
|
85
|
+
### Incidental Disclosures (§164.502(a)(1)(iii))
|
|
86
|
+
Permitted if:
|
|
87
|
+
- Reasonable safeguards are in place
|
|
88
|
+
- Minimum necessary standard is met
|
|
89
|
+
- Example: A patient overhearing another patient's conversation in a waiting room
|
|
90
|
+
|
|
91
|
+
---
|
|
92
|
+
|
|
93
|
+
## 4. Patient Rights
|
|
94
|
+
|
|
95
|
+
### Right of Access (§164.524)
|
|
96
|
+
- Individuals have the right to inspect and obtain a copy of their PHI in a **designated record set**
|
|
97
|
+
- **Timeline**: Provide access within **30 days** (one 30-day extension permitted with written notice)
|
|
98
|
+
- **Format**: Must provide in format requested if readily producible; electronic if requested
|
|
99
|
+
- **Fees**: May charge a reasonable, cost-based fee (labor + supplies + postage only); no retrieval fees
|
|
100
|
+
- **Denials**: Permitted for psychotherapy notes, information compiled for legal proceedings, PHI that could endanger life/safety; some denials are reviewable
|
|
101
|
+
|
|
102
|
+
> **2021 Rule Update**: HHS reinforced that fees must be limited; EHR patient portal access must be free.
|
|
103
|
+
|
|
104
|
+
### Right to Amend (§164.526)
|
|
105
|
+
- Individual may request amendment to their PHI in a designated record set
|
|
106
|
+
- **Timeline**: 60 days to act (one 60-day extension)
|
|
107
|
+
- May deny if: CE did not create the record; record is accurate and complete; not part of designated record set
|
|
108
|
+
|
|
109
|
+
### Right to Accounting of Disclosures (§164.528)
|
|
110
|
+
- Right to list of disclosures made in prior 6 years
|
|
111
|
+
- **Excludes**: TPO disclosures, to the individual, authorized disclosures, incidental, national security
|
|
112
|
+
- **Timeline**: 60 days (one 60-day extension)
|
|
113
|
+
|
|
114
|
+
### Right to Request Restrictions (§164.522(a))
|
|
115
|
+
- Individual may request restrictions on uses/disclosures for TPO or to family/friends
|
|
116
|
+
- CE is **not required** to agree — **except**: must honor restriction on disclosure to health plan for service paid out-of-pocket in full
|
|
117
|
+
|
|
118
|
+
### Right to Confidential Communications (§164.522(b))
|
|
119
|
+
- Individual may request alternative means or locations for communications
|
|
120
|
+
- CE must accommodate **reasonable requests**; no explanation required from individual
|
|
121
|
+
- Health plans must accommodate if individual states disclosure could endanger them
|
|
122
|
+
|
|
123
|
+
### Right to Notice (§164.520)
|
|
124
|
+
- Right to receive a Notice of Privacy Practices (see Section 5)
|
|
125
|
+
|
|
126
|
+
### Right to Opt Out of Fundraising (§164.514(f))
|
|
127
|
+
- Must include opt-out mechanism in every fundraising communication
|
|
128
|
+
|
|
129
|
+
---
|
|
130
|
+
|
|
131
|
+
## 5. Notice of Privacy Practices (NPP)
|
|
132
|
+
|
|
133
|
+
### Required for: All Covered Entities (not BAs)
|
|
134
|
+
|
|
135
|
+
### Must Be Provided (§164.520(c)):
|
|
136
|
+
- At first service delivery (in-person)
|
|
137
|
+
- On request
|
|
138
|
+
- On CE's website (if one exists)
|
|
139
|
+
- Health plans: at enrollment and every 3 years if material changes
|
|
140
|
+
|
|
141
|
+
### Required NPP Contents (§164.520(b)):
|
|
142
|
+
1. **Header**: "THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN GET ACCESS TO THIS INFORMATION. PLEASE REVIEW IT CAREFULLY."
|
|
143
|
+
2. Description of how CE may use/disclose PHI (with examples of TPO + other)
|
|
144
|
+
3. Description of other uses requiring authorization
|
|
145
|
+
4. Individual rights (access, amendment, accounting, restrictions, confidential comms, opt-out of fundraising)
|
|
146
|
+
5. CE's duties (maintain privacy, notify of breaches, abide by NPP)
|
|
147
|
+
6. How to complain (to CE and to HHS; no retaliation)
|
|
148
|
+
7. Contact person/office for more information
|
|
149
|
+
8. Effective date
|
|
150
|
+
|
|
151
|
+
### Electronic NPP:
|
|
152
|
+
- Can be provided electronically if individual agrees
|
|
153
|
+
- Must be in plain language
|
|
154
|
+
|
|
155
|
+
---
|
|
156
|
+
|
|
157
|
+
## 6. Minimum Necessary Standard
|
|
158
|
+
|
|
159
|
+
### Rule (§164.502(b), §164.514(d)):
|
|
160
|
+
When using or disclosing PHI, or requesting from another CE, make reasonable efforts to limit PHI to the **minimum necessary** to accomplish the intended purpose.
|
|
161
|
+
|
|
162
|
+
### Applies To:
|
|
163
|
+
- Routine disclosures → Establish policies identifying persons who need access + type of PHI
|
|
164
|
+
- Non-routine disclosures → Review on case-by-case basis
|
|
165
|
+
- Requests from others → Limit requests to minimum necessary
|
|
166
|
+
|
|
167
|
+
### Does NOT Apply To:
|
|
168
|
+
- Disclosures to or requests by a treating provider
|
|
169
|
+
- Disclosures to the individual
|
|
170
|
+
- Pursuant to individual's authorization
|
|
171
|
+
- Required by law
|
|
172
|
+
- For HHS compliance activities
|
|
173
|
+
|
|
174
|
+
### Practical Implementation:
|
|
175
|
+
- Role-based access controls in EHR systems
|
|
176
|
+
- Need-to-know training for workforce
|
|
177
|
+
- De-identify data where full PHI isn't required
|
|
178
|
+
|
|
179
|
+
---
|
|
180
|
+
|
|
181
|
+
## 7. Authorization Requirements
|
|
182
|
+
|
|
183
|
+
### When Required (§164.508):
|
|
184
|
+
- Most uses/disclosures not covered by TPO or §164.512 permitted disclosures
|
|
185
|
+
- **Always required for**: psychotherapy notes (with limited exceptions), marketing involving financial remuneration, sale of PHI
|
|
186
|
+
|
|
187
|
+
### Valid Authorization Must Contain (§164.508(c)):
|
|
188
|
+
1. Description of PHI to be used/disclosed (specific, meaningful)
|
|
189
|
+
2. Name/class of person(s) authorized to make the disclosure
|
|
190
|
+
3. Name/class of person(s) to whom disclosure may be made
|
|
191
|
+
4. Description of each purpose of the use/disclosure
|
|
192
|
+
5. Expiration date or event
|
|
193
|
+
6. Individual's signature and date
|
|
194
|
+
7. If signed by personal representative: description of authority
|
|
195
|
+
8. Statement that individual may revoke
|
|
196
|
+
9. Statement about re-disclosure risk (if applicable)
|
|
197
|
+
10. Conditioning statement (if authorization is conditioned on treatment/payment)
|
|
198
|
+
|
|
199
|
+
### Defective Authorization (§164.508(b)(2)):
|
|
200
|
+
Authorization is defective if:
|
|
201
|
+
- Expiration date has passed
|
|
202
|
+
- Not filled out completely
|
|
203
|
+
- CE knows it has been revoked
|
|
204
|
+
- Compound authorization (combining with another document) when not permitted
|
|
205
|
+
|
|
206
|
+
---
|
|
207
|
+
|
|
208
|
+
## 8. Special Categories of PHI
|
|
209
|
+
|
|
210
|
+
These categories receive **heightened protection** (often under state law as well):
|
|
211
|
+
|
|
212
|
+
| Category | Notes |
|
|
213
|
+
|----------|-------|
|
|
214
|
+
| **Psychotherapy notes** | Stored separately; require specific authorization for almost all uses/disclosures |
|
|
215
|
+
| **HIV/AIDS information** | Most states have additional restrictions beyond HIPAA |
|
|
216
|
+
| **Substance use disorder** (42 CFR Part 2) | Separate federal law with stricter rules than HIPAA |
|
|
217
|
+
| **Mental health records** | State law often adds restrictions |
|
|
218
|
+
| **Reproductive health** | Post-Dobbs guidance; HHS issued rules limiting disclosure for lawful reproductive care |
|
|
219
|
+
| **Genetic information** (GINA) | Cannot be used for underwriting by health plans |
|
|
220
|
+
| **Minors** | Generally parents are personal representatives; exceptions for emancipated minors, sensitive services |
|
|
221
|
+
|
|
222
|
+
> **Important**: State laws can be MORE protective than HIPAA. HIPAA sets a floor. Always check state law.
|
|
223
|
+
|
|
224
|
+
---
|
|
225
|
+
|
|
226
|
+
## 9. Administrative Requirements
|
|
227
|
+
|
|
228
|
+
### Policies & Procedures (§164.530(i)):
|
|
229
|
+
- Must implement written policies and procedures complying with Privacy Rule
|
|
230
|
+
- Must document policies; retain for 6 years from creation or last effective date
|
|
231
|
+
|
|
232
|
+
### Workforce Training (§164.530(b)):
|
|
233
|
+
- Train all workforce members on privacy policies as necessary for them to carry out their functions
|
|
234
|
+
- Train new members within reasonable time after joining
|
|
235
|
+
- Document training
|
|
236
|
+
|
|
237
|
+
### Sanctions (§164.530(e)):
|
|
238
|
+
- Apply appropriate sanctions against workforce members who violate privacy policies
|
|
239
|
+
- Document sanctions
|
|
240
|
+
|
|
241
|
+
### Complaint Process (§164.530(d)):
|
|
242
|
+
- Provide process for individuals to make complaints
|
|
243
|
+
- Document all complaints and their disposition
|
|
244
|
+
|
|
245
|
+
### Privacy Official (§164.530(a)):
|
|
246
|
+
- Designate a Privacy Official responsible for developing and implementing policies
|
|
247
|
+
- Designate a contact person for receiving complaints
|
|
248
|
+
|
|
249
|
+
### Retaliation Prohibition (§164.530(g)):
|
|
250
|
+
- May not retaliate against individuals for exercising HIPAA rights
|
|
251
|
+
- May not retaliate against workforce members for filing complaints or participating in investigations
|
|
252
|
+
|
|
253
|
+
### Waiver Prohibition (§164.530(h)):
|
|
254
|
+
- May not require individuals to waive HIPAA rights as condition of treatment/payment/enrollment
|
|
255
|
+
|
|
256
|
+
---
|
|
257
|
+
|
|
258
|
+
## 10. Marketing & Fundraising
|
|
259
|
+
|
|
260
|
+
### Marketing Definition (§164.501):
|
|
261
|
+
Communication about a product/service that encourages recipients to purchase or use the product/service.
|
|
262
|
+
|
|
263
|
+
### Marketing Requires Authorization EXCEPT:
|
|
264
|
+
- Face-to-face communication with individual
|
|
265
|
+
- Promotional gifts of nominal value
|
|
266
|
+
- Refill reminders (if financial remuneration is reasonably related to CE's cost)
|
|
267
|
+
- Communications about health-related products/services offered by CE (own services, treatment alternatives, case management) — if no financial remuneration from third party
|
|
268
|
+
|
|
269
|
+
### Sale of PHI (§164.502(a)(5)(ii)):
|
|
270
|
+
- Generally prohibited without authorization
|
|
271
|
+
- Exceptions: public health, research, treatment, sale/merger of business, BAA, providing individual access
|
|
272
|
+
|
|
273
|
+
### Fundraising (§164.514(f)):
|
|
274
|
+
- May use demographic info + dates of service without authorization
|
|
275
|
+
- Must include opt-out mechanism in each communication
|
|
276
|
+
- Cannot condition treatment on making a donation
|