Modifications to the HIPAA Privacy, Security, Enforcement, and Breach Notification Rules Under the Health Information Technology for Economic and Clinical Health Act and the Genetic Information Nondiscrimination Act; Other Modifications to the HIPAA Rules, 5565-5702 [2013-01073]

Download as PDF Vol. 78 Friday, No. 17 January 25, 2013 Part II Department of Health and Human Services sroberts on DSK5SPTVN1PROD with Office of the Secretary 45 CFR Parts 160 and 164 Modifications to the HIPAA Privacy, Security, Enforcement, and Breach Notification Rules Under the Health Information Technology for Economic and Clinical Health Act and the Genetic Information Nondiscrimination Act; Other Modifications to the HIPAA Rules; Final Rule VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 PO 00000 Frm 00001 Fmt 4717 Sfmt 4717 E:\FR\FM\25JAR2.SGM 25JAR2 5566 Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations DEPARTMENT OF HEALTH AND HUMAN SERVICES I. Executive Summary and Background ii. Summary of Major Provisions A. Executive Summary Office of the Secretary i. Purpose of the Regulatory Action This omnibus final rule is comprised of the following four final rules: 1. Final modifications to the HIPAA Privacy, Security, and Enforcement Rules mandated by the Health Information Technology for Economic and Clinical Health (HITECH) Act, and certain other modifications to improve the Rules, which were issued as a proposed rule on July 14, 2010. These modifications: • Make business associates of covered entities directly liable for compliance with certain of the HIPAA Privacy and Security Rules’ requirements. • Strengthen the limitations on the use and disclosure of protected health information for marketing and fundraising purposes, and prohibit the sale of protected health information without individual authorization. • Expand individuals’ rights to receive electronic copies of their health information and to restrict disclosures to a health plan concerning treatment for which the individual has paid out of pocket in full. • Require modifications to, and redistribution of, a covered entity’s notice of privacy practices. • Modify the individual authorization and other requirements to facilitate research and disclosure of child immunization proof to schools, and to enable access to decedent information by family members or others. • Adopt the additional HITECH Act enhancements to the Enforcement Rule not previously adopted in the October 30, 2009, interim final rule (referenced immediately below), such as the provisions addressing enforcement of noncompliance with the HIPAA Rules due to willful neglect. 2. Final rule adopting changes to the HIPAA Enforcement Rule to incorporate the increased and tiered civil money penalty structure provided by the HITECH Act, originally published as an interim final rule on October 30, 2009. 3. Final rule on Breach Notification for Unsecured Protected Health Information under the HITECH Act, which replaces the breach notification rule’s ‘‘harm’’ threshold with a more objective standard and supplants an interim final rule published on August 24, 2009. 4. Final rule modifying the HIPAA Privacy Rule as required by the Genetic Information Nondiscrimination Act (GINA) to prohibit most health plans from using or disclosing genetic information for underwriting purposes, which was published as a proposed rule on October 7, 2009. Need for the Regulatory Action 45 CFR Parts 160 and 164 RIN 0945–AA03 Modifications to the HIPAA Privacy, Security, Enforcement, and Breach Notification Rules Under the Health Information Technology for Economic and Clinical Health Act and the Genetic Information Nondiscrimination Act; Other Modifications to the HIPAA Rules Office for Civil Rights, Department of Health and Human Services. AGENCY: ACTION: Final rule. The Department of Health and Human Services (HHS or ‘‘the Department’’) is issuing this final rule to: Modify the Health Insurance Portability and Accountability Act (HIPAA) Privacy, Security, and Enforcement Rules to implement statutory amendments under the Health Information Technology for Economic and Clinical Health Act (‘‘the HITECH Act’’ or ‘‘the Act’’) to strengthen the privacy and security protection for individuals’ health information; modify the rule for Breach Notification for Unsecured Protected Health Information (Breach Notification Rule) under the HITECH Act to address public comment received on the interim final rule; modify the HIPAA Privacy Rule to strengthen the privacy protections for genetic information by implementing section 105 of Title I of the Genetic Information Nondiscrimination Act of 2008 (GINA); and make certain other modifications to the HIPAA Privacy, Security, Breach Notification, and Enforcement Rules (the HIPAA Rules) to improve their workability and effectiveness and to increase flexibility for and decrease burden on the regulated entities. SUMMARY: Effective date: This final rule is effective on March 26, 2013. Compliance date: Covered entities and business associates must comply with the applicable requirements of this final rule by September 23, 2013. sroberts on DSK5SPTVN1PROD with DATES: FOR FURTHER INFORMATION CONTACT: Andra Wicks 202–205–2292. SUPPLEMENTARY INFORMATION: VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 This final rule is needed to strengthen the privacy and security protections established under the Health Insurance Portability and Accountability of 1996 Act (HIPAA) for individual’s health information maintained in electronic health records and other formats. This final rule also makes changes to the HIPAA rules that are designed to increase flexibility for and decrease burden on the regulated entities, as well as to harmonize certain requirements with those under the Department’s Human Subjects Protections regulations. These changes are consistent with, and arise in part from, the Department’s obligations under Executive Order 13563 to conduct a retrospective review of our existing regulations for the purpose of identifying ways to reduce costs and increase flexibilities under the HIPAA Rules. We discuss our specific burden reduction efforts more fully in the Regulatory Impact Analysis. This final rule is comprised of four final rules, which have been combined to reduce the impact and number of times certain compliance activities need to be undertaken by the regulated entities. Legal Authority for the Regulatory Action The final rule implements changes to the HIPAA Rules under a number of authorities. First, the final rule modifies the Privacy, Security, and Enforcement Rules to strengthen privacy and security protections for health information and to improve enforcement as provided for by the Health Information Technology for Economic and Clinical Health (HITECH) Act, enacted as part of the American Recovery and Reinvestment Act of 2009 (ARRA). The rule also includes final modifications to the Breach Notification Rule, which will replace an interim final rule originally published in 2009 as required by the HITECH Act. Second, the final rule revises the HIPAA Privacy Rule to increase privacy protections for genetic information as required by the Genetic Information Nondiscrimination Act of 2008 (GINA). Finally, the Department uses its general authority under HIPAA to make a number of changes to the Rules that are intended to increase workability and flexibility, decrease burden, and better harmonize the requirements with those under other Departmental regulations. PO 00000 Frm 00002 Fmt 4701 Sfmt 4700 E:\FR\FM\25JAR2.SGM 25JAR2 Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations iii. Costs and Benefits This final rule is anticipated to have an annual effect on the economy of $100 million or more, making it an economically significant rule under Executive Order 12866. Accordingly, we have prepared a Regulatory Impact Analysis that presents the estimated costs and benefits of the proposed rule. The total cost of compliance with the rule’s provisions is estimated to be between $114 million and $225.4 million in the first year of implementation and approximately $14.5 million annually thereafter. Costs associated with the rule include: (i) Costs to HIPAA covered entities of revising and distributing new notices of privacy practices to inform individuals of their rights and how their information is protected; (ii) costs to covered entities related to compliance with breach notification requirements; (iii) costs to a portion of business associates to bring their subcontracts into compliance with business associate agreement requirements; and (iv) costs to a portion of business associates to achieve full compliance with the Security Rule. We summarize these costs in Table 1 below and explain the components and distribution of costs in detail in the Regulatory Impact Analysis. We are not able to quantify the benefits of the rule due to lack of data 5567 and the impossibility of monetizing the value of individuals’ privacy and dignity, which we believe will be enhanced by the strengthened privacy and security protections, expanded individual rights, and improved enforcement enabled by the rule. We also believe that some entities affected by the rule will realize cost savings as a result of provisions that simplify and streamline certain requirements, and increase flexibility, under the HIPAA Rules. However, we are unable to quantify such cost savings due to a lack of data. We describe such benefits in the Regulatory Impact Analysis. TABLE 1—ESTIMATED COSTS OF THE FINAL RULE Cost element Approximate number of affected entities Notices of Privacy Practices ........... Breach Notification Requirements .. Business Associate Agreements .... Security Rule Compliance by Business Associates. 700,000 covered entities ....................................................................... 19,000 covered entities ......................................................................... 250,000–500,000 business associates of covered entities ................... 200,000–400,000 business associates of covered entities ................... $55.9 million. 14.5 million.1 21 million–42 million. 22.6 million–113 million. Total ......................................... ................................................................................................................ 114 million–225.4 million. sroberts on DSK5SPTVN1PROD with B. Statutory and Regulatory Background i. HIPAA and the Privacy, Security, and Enforcement Rules The HIPAA Privacy, Security, and Enforcement Rules implement certain of the Administrative Simplification provisions of title II, subtitle F, of the Health Insurance Portability and Accountability Act of 1996 (HIPAA) (Pub. L. 104–191), which added a new part C to title XI of the Social Security Act (sections 1171–1179 of the Social Security Act, 42 U.S.C. 1320d–1320d– 8). The HIPAA Administrative Simplification provisions provided for the establishment of national standards for the electronic transmission of certain health information, such as standards for certain health care transactions conducted electronically and code sets and unique identifiers for health care providers and employers. The HIPAA Administrative Simplification provisions also required the establishment of national standards to protect the privacy and security of personal health information and established civil money penalties for violations of the Administrative Simplification provisions. The Administrative Simplification provisions of HIPAA apply to three types of entities, which are known as 1 The costs associated with breach notification will be incurred on an annual basis. All other costs are expected in the first year of implementation. VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 ‘‘covered entities’’: health care providers who conduct covered health care transactions electronically, health plans, and health care clearinghouses. The HIPAA Privacy Rule, 45 CFR Part 160 and Subparts A and E of Part 164, requires covered entities to have safeguards in place to ensure the privacy of protected health information, sets forth the circumstances under which covered entities may use or disclose an individual’s protected health information, and gives individuals rights with respect to their protected health information, including rights to examine and obtain a copy of their health records and to request corrections. Covered entities that engage business associates to work on their behalf must have contracts or other arrangements in place with their business associates to ensure that the business associates safeguard protected health information, and use and disclose the information only as permitted or required by the Privacy Rule. The HIPAA Security Rule, 45 CFR Part 160 and Subparts A and C of Part 164, applies only to protected health information in electronic form and requires covered entities to implement certain administrative, physical, and technical safeguards to protect this electronic information. Like the Privacy Rule, covered entities must have contracts or other arrangements in place PO 00000 Frm 00003 Fmt 4701 Sfmt 4700 Total cost with their business associates that provide satisfactory assurances that the business associates will appropriately safeguard the electronic protected health information they create, receive, maintain, or transmit on behalf of the covered entities. The HIPAA Enforcement Rule, 45 CFR Part 160, Subparts C–E, establishes rules governing the compliance responsibilities of covered entities with respect to the enforcement process, including the rules governing investigations by the Department, rules governing the process and grounds for establishing the amount of a civil money penalty where a violation of a HIPAA Rule has been found, and rules governing the procedures for hearings and appeals where the covered entity challenges a violation determination. Since the promulgation of the HIPAA Rules, legislation has been enacted requiring modifications to the Rules. In particular, the Health Information Technology for Economic and Clinical Health (HITECH) Act, which was enacted on February 17, 2009, as title XIII of division A and title IV of division B of the American Recovery and Reinvestment Act of 2009 (ARRA), Public Law 111–5, modifies certain provisions of the Social Security Act pertaining to the HIPAA Rules, as well as requires certain modifications to the Rules themselves, to strengthen HIPAA privacy, security, and enforcement. The E:\FR\FM\25JAR2.SGM 25JAR2 5568 Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations sroberts on DSK5SPTVN1PROD with Act also provides new requirements for notification of breaches of unsecured protected health information by covered entities and business associates. In addition, the Genetic Information Nondiscrimination Act of 2008 (GINA) calls for changes to the HIPAA Privacy Rule to strengthen privacy protections for genetic information. This final rule implements the modifications required by GINA, as well as most of the privacy, security, and enforcement provisions of the HITECH Act. This final rule also includes certain other modifications to the HIPAA Rules to improve their workability and effectiveness. ii. The Health Information Technology for Economic and Clinical Health Act The HITECH Act is designed to promote the widespread adoption and interoperability of health information technology. Subtitle D of title XIII, entitled ‘‘Privacy,’’ supports this goal by adopting amendments designed to strengthen the privacy and security protections for health information established by HIPAA. These provisions include extending the applicability of certain of the Privacy and Security Rules’ requirements to the business associates of covered entities; requiring that Health Information Exchange Organizations and similar organizations, as well as personal health record vendors that provide services to covered entities, shall be treated as business associates; requiring HIPAA covered entities and business associates to provide for notification of breaches of ‘‘unsecured protected health information’’; establishing new limitations on the use and disclosure of protected health information for marketing and fundraising purposes; prohibiting the sale of protected health information; and expanding individuals’ rights to access their protected health information, and to obtain restrictions on certain disclosures of protected health information to health plans. In addition, subtitle D adopts provisions designed to strengthen and expand HIPAA’s enforcement provisions. We discuss these statutory provisions in more detail below where we describe section-by-section how this final rule implements the provisions. We do not address in this rulemaking the accounting for disclosures requirement in section 13405 of the Act, which is the subject of a separate proposed rule published on May 31, 2011, at 76 FR 31426, or the penalty distribution methodology requirement in section 13410(c) of the Act, which will be the subject of a future rulemaking. Since enactment of the HITECH Act a number of steps have been taken to VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 implement the strengthened privacy, security, and enforcement provisions through rulemakings and related actions. On August 24, 2009, the Department published interim final regulations to implement the breach notification provisions at section 13402 of the HITECH Act (74 FR 42740), which were effective September 23, 2009. Similarly, the Federal Trade Commission (FTC) published final regulations implementing the breach notification provisions at section 13407 for personal health record vendors and their third party service providers on August 25, 2009 (74 FR 42962), effective September 24, 2009. For purposes of determining to what information the HHS and FTC breach notification regulations apply, the Department also issued, first on April 17, 2009 (published on April 27, 2009, 74 FR 19006), and then later with its interim final rule, the guidance required by the HITECH Act under 13402(h) specifying the technologies and methodologies that render protected health information unusable, unreadable, or indecipherable to unauthorized individuals. Additionally, to conform the provisions of the Enforcement Rule to the HITECH Act’s tiered and increased civil money penalty structure, which became effective on February 18, 2009, the Department published an interim final rule on October 30, 2009 (74 FR 56123), effective November 30, 2009. The Department published a notice of proposed rulemaking (NPRM) on July 14, 2010, (75 FR 40868) to implement many of the remaining privacy, security, and enforcement provisions of the HITECH Act. The public was invited to comment on the proposed rule for 60 days following publication. The comment period closed on September 13, 2010. The Department received about 300 comments on the NPRM. The NPRM proposed to extend the applicability of certain of the Privacy and Security Rules’ requirements to the business associates of covered entities, making business associates directly liable for violations of these requirements. Additionally, the NPRM proposed to define a subcontractor as a business associate to ensure any protected health information the subcontractor creates or receives on behalf of the business associate is appropriately safeguarded. The NPRM proposed to establish new limitations on the use and disclosure of protected health information for marketing and fundraising purposes and to prohibit the sale of protected health information without an authorization. The NPRM also proposed to expand an individual’s right to obtain an electronic copy of an PO 00000 Frm 00004 Fmt 4701 Sfmt 4700 individual’s protected health information, and the right to restrict certain disclosures of protected health information to a health plan for payment or health care operations purposes. In addition, the NPRM proposed to further modify the Enforcement Rule to implement more of the HITECH Act’s changes to HIPAA enforcement. In addition to the proposed modifications to implement the HITECH Act, the NPRM also proposed certain other modifications to the HIPAA Rules. The NPRM proposed to permit the use of compound authorizations for conditioned and unconditioned research activities and requested comment regarding permitting authorizations for future research. Additionally, the NPRM proposed to modify the Privacy Rule’s application to the individually identifiable health information of decedents and to permit covered entities that obtain the agreement of a parent to provide proof of immunization without written authorization to schools that are required to have such information. iii. The Genetic Information Nondiscrimination Act The Genetic Information Nondiscrimination Act of 2008 (‘‘GINA’’), Pub. L. 110–233, 122 Stat. 881, prohibits discrimination based on an individual’s genetic information in both the health coverage (Title I) and employment (Title II) contexts. In addition to the nondiscrimination provisions, section 105 of Title I of GINA contains new privacy protections for genetic information, which require the Secretary of HHS to revise the Privacy Rule to clarify that genetic information is health information and to prohibit group health plans, health insurance issuers (including HMOs), and issuers of Medicare supplemental policies from using or disclosing genetic information for underwriting purposes. On October 7, 2009, the Department published a proposed rule to strengthen the privacy protections for genetic information under the HIPAA Privacy Rule by implementing the protections for genetic information required by GINA and making related changes to the Rule. The 60-day public comment period for the proposed rule closed on December 7, 2009. The Department received about 25 comments on the proposed rule. II. Overview of the Final Rule In this final rule the Department finalizes the modifications to the HIPAA Privacy, Security, and Enforcement Rules to implement many of the E:\FR\FM\25JAR2.SGM 25JAR2 Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations privacy, security, and enforcement provisions of the HITECH Act and make other changes to the Rules; modifies the Breach Notification Rule; finalizes the modifications to the HIPAA Privacy Rule to strengthen privacy protections for genetic information; and responds to the public comments received on the proposed and interim final rules. Section III below describes the effective and compliance dates of the final rule. Section IV describes the changes to the HIPAA Privacy, Security, and Enforcement Rules under the HITECH Act and other modifications that were proposed in July 2010, as well as the modifications to the Enforcement Rule under the HITECH Act that were addressed in the interim final rule published in October 2009. Section V describes the changes to the Breach Notification Rule. Section VI discusses the changes to the HIPAA Privacy Rule to strengthen privacy protections for genetic information. sroberts on DSK5SPTVN1PROD with III. Effective and Compliance Dates With respect to the HITECH Act requirements, section 13423 of the Act provides that the provisions in subtitle D took effect one year after enactment, i.e., on February 18, 2010, except as specified otherwise. However, there are a number of exceptions to this general rule. For example, the tiered and increased civil money penalty provisions of section 13410(d) were effective for violations occurring after the date of enactment, and sections 13402 and 13407 of the Act regarding breach notification required interim final rules within 180 days of enactment, with effective dates 30 days after the publication of such rules. Other provisions of the Act have later effective dates. For example, the provision at section 13410(a)(1) of the Act providing that the Secretary’s authority to impose a civil money penalty will only be barred to the extent a criminal penalty has been imposed, rather than in cases in which the offense in question merely constitutes an offense that is criminally punishable, became effective for violations occurring on or after February 18, 2011. The discussion below generally pertains to the statutory provisions that became effective on February 18, 2010, or, in a few cases, on a later date. Proposed Rule We proposed that covered entities and business associates would have 180 days beyond the effective date of the final rule to come into compliance with most of the rule’s provisions. We believed that a 180-day compliance period would suffice for future VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 modifications to the HIPAA Rules, and we proposed to add a provision at § 160.105 to address the compliance date generally for implementation of new or modified standards in the HIPAA Rules. We proposed that § 160.105 would provide that with respect to new standards or implementation specifications or modifications to standards or implementation specifications in the HIPAA Rules, except as otherwise provided, covered entities and business associates would be required to comply with the applicable new or modified standards or implementation specifications no later than 180 days from the effective date of any such change. For future modifications to the HIPAA Rules necessitating a longer compliance period, we would specify a longer period in the regulatory text. Finally, we proposed to retain the compliance date provisions at §§ 164.534 and 164.318, which provide the compliance dates of April 14, 2003, and April 20, 2005, for initial implementation of the HIPAA Privacy and Security Rules, respectively, for historical purposes only. Overview of Public Comments Most of the comments addressing the proposed compliance periods as outlined above fell into three categories. First, several commenters supported the proposed compliance timelines and agreed that 180 days is sufficient time for covered entities, business associates, and subcontractors of all sizes to come into compliance with the final rule. Second, a few commenters supported the proposed 180-day compliance period, but expressed concern that the Department may wish to extend the 180day compliance period in the future, if it issues modifications or new provisions that require a longer compliance period. Third, several commenters requested that the Department extend the 180-day compliance period both with regard to the modifications contained in this final rule and with regard to the more general proposed compliance deadline, as they believe 180 days is an insufficient amount of time for covered entities, business associates, and subcontractors to come into compliance with the modified rules, particularly with regard to changes in technology. Final Rule The final rule is effective on March 26, 2013. Covered entities and business associates of all sizes will have 180 days beyond the effective date of the final rule to come into compliance with most of the final rule’s provisions, including PO 00000 Frm 00005 Fmt 4701 Sfmt 4700 5569 the modifications to the Breach Notification Rule and the changes to the HIPAA Privacy Rule under GINA. We understand that some covered entities, business associates, and subcontractors remain concerned that a 180-day period does not provide sufficient time to come into compliance with the modifications. However, we believe not only that providing a 180-day compliance period best comports with section 1175(b)(2) of the Social Security Act, 42 U.S.C. 1320d–4, and our implementing provision at § 160.104(c)(1), which require the Secretary to provide at least a 180-day period for covered entities to comply with modifications to standards and implementation specifications in the HIPAA Rules, but also that providing a 180-day compliance period best protects the privacy and security of patient information, in accordance with the goals of the HITECH Act. In addition, to make clear to the industry our expectation that going forward we will provide a 180-day compliance date for future modifications to the HIPAA Rules, we adopt the provision we proposed at § 160.105, which provides that with respect to new or modified standards or implementation specifications in the HIPAA Rules, except as otherwise provided, covered entities and business associates must comply with the applicable new or modified standards or implementation specifications no later than 180 days from the effective date of any such change. In cases where a future modification necessitates a longer compliance period, the Department will expressly provide for one, as it has done in this rulemaking with respect to the time permitted for business associate agreements to be modified. For the reasons proposed, the final rule also retains the compliance date provisions at §§ 164.534 and 164.318, which provide the compliance dates of April 14, 2003, and April 20, 2005, for initial implementation of the HIPAA Privacy and Security Rules, respectively. We note that § 160.105 regarding the compliance date of new or modified standards or implementation specifications does not apply to modifications to the provisions of the HIPAA Enforcement Rule, because such provisions are not standards or implementation specifications (as the terms are defined at § 160.103). Such provisions are in effect and apply at the time the final rule becomes effective or as otherwise specifically provided. In addition, as explained above, our general rule for a 180-day compliance period for new or modified standards would not apply where we expressly provide a different compliance period in E:\FR\FM\25JAR2.SGM 25JAR2 5570 Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations the regulation for one or more provisions. For purposes of this rule, the 180-day compliance period would not govern the time period required to modify those business associate agreements that qualify for the longer transition period in § 164.532, as we discuss further below. Finally, the provisions of section 13402(j) of the HITECH Act apply to breaches of unsecured protected health information discovered on or after September 23, 2009, the date of the publication of the interim final rule. Thus, during the 180 day period before compliance with this final rule is required, covered entities and business associates are still required to comply with the breach notification requirements under the HITECH Act and must continue to comply with the requirements of the interim final rule. We believe that this transition period provides covered entities and business associates with adequate time to come into compliance with the revisions in this final rule and at the same time to continue to fulfill their breach notification obligations under the HITECH Act. IV. Modifications to the HIPAA Privacy, Security, and Enforcement Rules Under the HITECH Act; Other Modifications to the HIPAA Rules The discussion below provides a section-by-section description of the final rule, as well as responds to public comments where substantive comments were received regarding particular provisions. A. Subparts A and B of Part 160: Statutory Basis and Purpose, Applicability, Definitions, and Preemption of State Law Subpart A of Part 160 of the HIPAA Rules contains general provisions that apply to all of the HIPAA Rules. Subpart B of Part 160 contains the regulatory provisions implementing HIPAA’s preemption provisions. We proposed to amend a number of these provisions. Some of the proposed, and now final, changes are necessitated by the statutory changes made by the HITECH Act and GINA, while others are of a technical or conforming nature. sroberts on DSK5SPTVN1PROD with 1. Subpart A—General Provisions, Section 160.101—Statutory Basis and Purpose This section sets out the statutory basis and purpose of the HIPAA Rules. We proposed and include in this final rule a technical change to include references to the provisions of GINA and the HITECH Act upon which most VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 of the regulatory changes below are based. 2. Subpart A—General Provisions, Section 160.102—Applicability This section sets out to whom the HIPAA Rules apply. We proposed to add and include in this final rule a new paragraph (b) to make clear, consistent with the HITECH Act, that certain of the standards, requirements, and implementation specifications of the subchapter apply to business associates. 3. Subpart A—General Provisions, Section 160.103—Definitions Section 160.103 contains definitions of terms that appear throughout the HIPAA Rules. The final rule modifies a number of these definitions to implement the HITECH Act and make other needed changes. a. Definition of ‘‘Business Associate’’ The HIPAA Privacy and Security Rules permit a covered entity to disclose protected health information to a business associate, and allow a business associate to create, receive, maintain, or transmit protected health information on its behalf, provided the covered entity obtains satisfactory assurances in the form of a contract or other arrangement that the business associate will appropriately safeguard the information. The HIPAA Rules define ‘‘business associate’’ generally to mean a person who performs functions or activities on behalf of, or certain services for, a covered entity that involve the use or disclosure of protected health information. We proposed a number of modifications to the definition of ‘‘business associate’’ to implement the HITECH Act, to conform the term to the statutory provisions of the Patient Safety and Quality Improvement Act of 2005 (PSQIA), 42 U.S.C. 299b–21, et seq., and to make other changes to the definition. i. Inclusion of Patient Safety Organizations Proposed Rule We proposed to add patient safety activities to the list of functions and activities a person may undertake on behalf of a covered entity that give rise to a business associate relationship. PSQIA, at 42 U.S.C. 299b–22(i)(1), provides that Patient Safety Organizations (PSOs) must be treated as business associates when applying the Privacy Rule. PSQIA provides for the establishment of PSOs to receive reports of patient safety events or concerns from providers and provide analyses of events to reporting providers. A reporting provider may be a HIPAA PO 00000 Frm 00006 Fmt 4701 Sfmt 4700 covered entity and, thus, information reported to a PSO may include protected health information that the PSO may analyze on behalf of the covered provider. The analysis of such information is a patient safety activity for purposes of PSQIA and the Patient Safety Rule, 42 CFR 3.10, et seq. While the HIPAA Rules as written would treat a PSO as a business associate when the PSO was performing quality analyses and other activities on behalf of a covered health care provider, we proposed this change to the definition of ‘‘business associate’’ to more clearly align the HIPAA and Patient Safety Rules. Overview of Public Comment Commenters on this topic supported the express inclusion of patient safety activities within the definition of ‘‘business associate.’’ Final Rule The final rule adopts the proposed modification. ii. Inclusion of Health Information Organizations (HIO), E-Prescribing Gateways, and Other Persons That Facilitate Data Transmission; as Well as Vendors of Personal Health Records Proposed Rule Section 13408 of the HITECH Act provides that an organization, such as a Health Information Exchange Organization, E-prescribing Gateway, or Regional Health Information Organization, that provides data transmission of protected health information to a covered entity (or its business associate) and that requires access on a routine basis to such protected health information must be treated as a business associate for purposes of the Act and the HIPAA Privacy and Security Rules. Section 13408 also provides that a vendor that contracts with a covered entity to allow the covered entity to offer a personal health record to patients as part of the covered entity’s electronic health record shall be treated as a business associate. Section 13408 requires that such organizations and vendors enter into a written business associate contract or other arrangement with the covered entity in accordance with the HIPAA Rules. In accordance with the Act, we proposed to modify the definition of ‘‘business associate’’ to explicitly designate these persons as business associates. Specifically, we proposed to include in the definition: (1) A Health Information Organization, E-prescribing Gateway, or other person that provides data transmission services with respect E:\FR\FM\25JAR2.SGM 25JAR2 Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations sroberts on DSK5SPTVN1PROD with to protected health information to a covered entity and that requires routine access to such protected health information; and (2) a person who offers a personal health record to one or more individuals on behalf of a covered entity. We proposed to refer to ‘‘Health Information Organization’’ in the NPRM rather than ‘‘Health Information Exchange Organization’’ as used in the Act because it is our understanding that ‘‘Health Information Organization’’ is the more widely recognized and accepted term to describe an organization that oversees and governs the exchange of health-related information among organizations.2 The Act also specifically refers to Regional Health Information Organizations; however, we did not believe the inclusion of the term in the definition of ‘‘business associate’’ was necessary as a Regional Health Information Organization is simply a Health Information Organization that governs health information exchange among organizations within a defined geographic area.3 Further, the specific terms of ‘‘Health Information Organization’’ and ‘‘E-prescribing Gateway’’ were included as merely illustrative of the types of organizations that would fall within this paragraph of the definition of ‘‘business associate.’’ We requested comment on the use of these terms within the definition and whether additional clarifications or additions were necessary. Section 13408 also provides that the data transmission organizations that the Act requires to be treated as business associates are those that require access to protected health information on a routine basis. Conversely, data transmission organizations that do not require access to protected health information on a routine basis would not be treated as business associates. This is consistent with our prior interpretation of the definition of ‘‘business associate,’’ through which we have stated that entities that act as mere conduits for the transport of protected health information but do not access the information other than on a random or infrequent basis are not business associates. See https://www.hhs.gov/ocr/ privacy/hipaa/faq/providers/business/ 245.html. In contrast, entities that manage the exchange of protected 2 Department of Health and Human Services Office of the National Coordinator for Health Information Technology, The National Alliance for Health Information Technology Report to the Office of the National Coordinator for Health Information Technology: Defining Key Health Information Terms, Pg. 24 (2008). 3 Id. at 25. VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 5571 health information through a network, including providing record locator services and performing various oversight and governance functions for electronic health information exchange, have more than ‘‘random’’ access to protected health information and thus, would fall within the definition of ‘‘business associate.’’ that a vendor offering a personal health record to a patient on behalf of a covered entity only acts as a conduit because there is no access by the vendor to protected health information; another commenter suggested that personal health record vendors be business associates only when they have routine access to protected health information. Overview of Public Comments Commenters generally supported the inclusion of Health Information Organizations, personal health record vendors, and similar entities in the definition of ‘‘business associate.’’ However, commenters sought various clarifications as discussed below. Commenters generally supported use of the term Health Information Organization in lieu of more restrictive terms, such as Regional Health Information Organization. Some commenters suggested that the term Health Information Organization be defined, so as to avoid confusion as the industry develops, and suggested various alternatives for doing so. Several commenters recommended that the Office for Civil Rights (OCR) maintain a Web site link that lists current terms for entities that OCR considers to be Health Information Organizations. Other commenters requested clarification on what it means to have ‘‘access on a routine basis’’ to protected health information for purposes of the definition and determining whether certain entities are excluded as mere conduits. For example, commenters asked whether the definition of business associate would include broadband suppliers or internet service providers, vendors that only have the potential to come into contact with protected health information, or entities contracted on a contingency basis that may at some point in the future have access to protected health information. Several document storage companies argued that entities like theirs should be characterized as conduits, as they do not view the protected health information they store. Several commenters sought clarification regarding when personal health record vendors would be considered business associates. For example, commenters asked whether personal health record vendors would be business associates when the vendor provided the personal health record in collaboration with the covered entity, when the personal health record is linked to a covered entity’s electronic health record, or when the personal health record is offered independently to the individual, among other scenarios. One commenter suggested Final Rule The final rule adopts the language that expressly designates as business associates: (1) A Health Information Organization, E-prescribing Gateway, or other person that provides data transmission services with respect to protected health information to a covered entity and that requires routine access to such protected health information; and (2) a person who offers a personal health record to one or more individuals on behalf of a covered entity. We decline to provide a definition for Health Information Organization. We recognize that the industry continues to develop and thus the type of entities that may be considered Health Information Organizations continues to evolve. For this reason, we do not think it prudent to include in the regulation a specific definition at this time. We anticipate continuing to issue guidance in the future on our web site on the types of entities that do and do not fall within the definition of business associate, which can be updated as the industry evolves. Regarding what it means to have ‘‘access on a routine basis’’ to protected health information with respect to determining which types of data transmission services are business associates versus mere conduits, such a determination will be fact specific based on the nature of the services provided and the extent to which the entity needs access to protected health information to perform the service for the covered entity. The conduit exception is a narrow one and is intended to exclude only those entities providing mere courier services, such as the U.S. Postal Service or United Parcel Service and their electronic equivalents, such as internet service providers (ISPs) providing mere data transmission services. As we have stated in prior guidance, a conduit transports information but does not access it other than on a random or infrequent basis as necessary to perform the transportation service or as required by other law. For example, a telecommunications company may have occasional, random access to protected health information when it reviews whether the data transmitted over its network is arriving PO 00000 Frm 00007 Fmt 4701 Sfmt 4700 E:\FR\FM\25JAR2.SGM 25JAR2 sroberts on DSK5SPTVN1PROD with 5572 Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations at its intended destination. Such occasional, random access to protected health information would not qualify the company as a business associate. In contrast, an entity that requires access to protected health information in order to perform a service for a covered entity, such as a Health Information Organization that manages the exchange of protected health information through a network on behalf of covered entities through the use of record locator services for its participants (and other services), is not considered a conduit and, thus, is not excluded from the definition of business associate. We intend to issue further guidance in this area as electronic health information exchange continues to evolve. We note that the conduit exception is limited to transmission services (whether digital or hard copy), including any temporary storage of transmitted data incident to such transmission. In contrast, an entity that maintains protected health information on behalf of a covered entity is a business associate and not a conduit, even if the entity does not actually view the protected health information. We recognize that in both situations, the entity providing the service to the covered entity has the opportunity to access the protected health information. However, the difference between the two situations is the transient versus persistent nature of that opportunity. For example, a data storage company that has access to protected health information (whether digital or hard copy) qualifies as a business associate, even if the entity does not view the information or only does so on a random or infrequent basis. Thus, document storage companies maintaining protected health information on behalf of covered entities are considered business associates, regardless of whether they actually view the information they hold. To help clarify this point, we have modified the definition of ‘‘business associate’’ to generally provide that a business associate includes a person who ‘‘creates, receives, maintains, or transmits’’ (emphasis added) protected health information on behalf of a covered entity. Several commenters sought clarification on when a personal health record vendor would be providing a personal health record ‘‘on behalf of’’ a covered entity and thus, would be a business associate for purposes of the HIPAA Rules. As with data transmission services, determining whether a personal health record vendor is a business associate is a fact specific determination. A personal health record VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 vendor is not a business associate of a covered entity solely by virtue of entering into an interoperability relationship with a covered entity. For example, when a personal health record vendor and a covered entity establish the electronic means for a covered entity’s electronic health record to send protected health information to the personal health record vendor pursuant to the individual’s written authorization, it does not mean that the personal health record vendor is offering the personal health record on behalf of the covered entity, even if there is an agreement between the personal health record vendor and the covered entity governing the exchange of data (such as an agreement specifying the technical specifications for exchanging of data or specifying that such data shall be kept confidential). In contrast, when a covered entity hires a vendor to provide and manage a personal health record service the covered entity wishes to offer its patients or enrollees, and provides the vendor with access to protected health information in order to do so, the personal health record vendor is a business associate. A personal health record vendor may offer personal health records directly to individuals and may also offer personal health records on behalf of covered entities. In such cases, the personal health record vendor is only subject to HIPAA as a business associate with respect to personal health records that are offered to individuals on behalf of covered entities. We also clarify that, contrary to one commenter’s suggestion, a personal health record vendor that offers a personal health record to a patient on behalf of a covered entity does not act merely as a conduit. Rather, the personal health record vendor is maintaining protected health information on behalf of the covered entity (for the benefit of the individual). Further, a personal health record vendor that operates a personal health record on behalf of a covered entity is a business associate if it has access to protected health information, regardless of whether the personal health record vendor actually exercises this access. We believe the revisions to the definition of ‘‘business associate’’ discussed above clarify these points. As with other aspects of the definition of ‘‘business associate,’’ we intend to provide future guidance on when a personal health record vendor is a business associate for purposes of the HIPAA Rules. PO 00000 Frm 00008 Fmt 4701 Sfmt 4700 Response to Other Public Comments Comment: One commenter recommended that the term ‘‘person’’ used in describing who provides transmission services to a covered entity be clarified to apply also to entities and organizations. Response: The term ‘‘person’’ as defined at § 160.103 includes entities as well as natural persons. Comment: One commenter asked whether subcontractors that support business associates with personal health record related functions are subject to the breach notification requirements under the HIPAA Breach Notification Rule or that of the FTC. Response: As discussed below, a subcontractor that creates, receives, maintains, or transmits protected health information on behalf of a business associate, including with respect to personal health record functions, is a HIPAA business associate and thus, is subject to the HIPAA Breach Notification Rule and not that of the FTC. The analysis of whether a subcontractor is acting on behalf of a business associate is the same analysis as discussed above with respect to whether a business associate is acting on behalf of a covered entity. iii. Inclusion of Subcontractors Proposed Rule We proposed in the definition of ‘‘business associate’’ to provide that subcontractors of a covered entity, i.e., those persons that perform functions for or provide services to a business associate other than in the capacity as a member of the business associate’s workforce, are also business associates to the extent that they require access to protected health information. We also proposed to define ‘‘subcontractor’’ in § 160.103 as a person who acts on behalf of a business associate, other than in the capacity of a member of the workforce of such business associate. Even though we used the term ‘‘subcontractor,’’ which implies there is a contract in place between the parties, the definition would apply to an agent or other person who acts on behalf of the business associate, even if the business associate has failed to enter into a business associate contract with the person. We requested comment on the use of the term ‘‘subcontractor’’ and its proposed definition. The intent of the proposed extension of the Rules to subcontractors was to avoid having privacy and security protections for protected health information lapse merely because a function is performed by an entity that is a subcontractor rather than an entity E:\FR\FM\25JAR2.SGM 25JAR2 Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations sroberts on DSK5SPTVN1PROD with with a direct relationship with a covered entity. Allowing such a lapse in privacy and security protections could allow business associates to avoid liability imposed upon them by sections 13401 and 13404 of the Act. Further, applying HIPAA privacy and security requirements directly to subcontractors also ensures that the privacy and security protections of the HIPAA Rules extend beyond covered entities to those entities that create or receive protected health information in order for the covered entity to perform its health care functions. Therefore, we proposed that downstream entities that work at the direction of or on behalf of a business associate and handle protected health information would also be required to comply with the applicable Privacy and Security Rule provisions in the same manner as the primary business associate, and likewise would incur liability for acts of noncompliance. This proposed modification would not require the covered entity to have a contract with the subcontractor; rather, the obligation would remain on each business associate to obtain satisfactory assurances in the form of a written contract or other arrangement that a subcontractor will appropriately safeguard protected health information. For example, if a business associate, such as a third party administrator, hires a company to handle document and media shredding to securely dispose of paper and electronic protected health information, then the shredding company would be directly required to comply with the applicable requirements of the HIPAA Security Rule (e.g., with respect to proper disposal of electronic media) and the Privacy Rule (e.g., with respect to limiting its uses and disclosures of the protected health information in accordance with its contract with the business associate). Overview of Public Comments While some commenters generally supported extending the business associate provisions of the Rules to subcontractors, many opposed such an extension arguing, among other things, that doing so was not the intent of Congress and beyond the statutory authority of the Department, that confusion may ensue with covered entities seeking to establish direct business associate contracts with subcontractors or prohibiting business associates from establishing subcontractor relationships altogether, and/or that creating direct liability for subcontractors will discourage such entities from operating and participating in the health care industry. Some VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 commenters asked how far down the ‘‘chain’’ of subcontractors do the HIPAA Rules apply—i.e., do the Rules apply only to the first tier subcontractor or to all subcontractors down the chain. In response to our request for comment on this issue, several commenters were concerned that use of the term subcontractor was confusing and instead suggested a different term be used, such as business associate contractor or downstream business associate, to avoid confusion between primary business associates of a covered entity and subcontractors. Other commenters suggested changes to the definition of subcontractor itself to better clarify the scope of the definition. Several commenters requested specific guidance on who is and is not a subcontractor under the definitions of ‘‘business associate’’ and ‘‘subcontractor.’’ For example, one commenter asked whether an entity that shreds documents for a business associate for the business associate’s activities and not for the covered entity, would qualify as a subcontractor. Another commenter asked whether disclosures by a business associate of protected health information for its own management and administration or legal needs creates a subcontractor relationship. Other commenters recommended that subcontractors without routine access to protected health information, or who do not access protected health information at all for their duties, not be considered business associates. Final Rule The final rule adopts the proposal to apply the business associate provisions of the HIPAA Rules to subcontractors and thus, provides in the definition of ‘‘business associate’’ that a business associate includes a ‘‘subcontractor that creates, receives, maintains, or transmits protected health information on behalf of the business associate.’’ In response to comments, we clarify the definition of ‘‘subcontractor’’ in § 160.103 to provide that subcontractor means: ‘‘a person to whom a business associate delegates a function, activity, or service, other than in the capacity of a member of the workforce of such business associate.’’ Thus, a subcontractor is a person to whom a business associate has delegated a function, activity, or service the business associate has agreed to perform for a covered entity or business associate. A subcontractor is then a business associate where that function, activity, or service involves the creation, receipt, maintenance, or transmission of protected health information. We also decline to replace the term PO 00000 Frm 00009 Fmt 4701 Sfmt 4700 5573 ‘‘subcontractor’’ with another, as we were not persuaded by any of the alternatives suggested by commenters (e.g., ‘‘business associate contractor,’’ ‘‘downstream business associate,’’ or ‘‘downstream entity’’). We disagree with the commenters that suggested that applying the business associate provisions of the HIPAA Rules to subcontractors is beyond the Department’s statutory authority. In the HITECH Act, Congress created direct liability under the HIPAA Privacy and Security Rules for persons that are not covered entities but that create or receive protected health information in order for a covered entity to perform its health care functions, to ensure individuals’ personal health information remains sufficiently protected in the hands of these entities. As stated in the NPRM, applying the business associate provisions only to those entities that have a direct relationship with a covered entity does not achieve that intended purpose. Rather, it allows privacy and security protections for protected health information to lapse once a subcontractor is enlisted to assist in performing a function, activity, or service for the covered entity, while at the same time potentially allowing certain primary business associates to avoid liability altogether for the protection of the information the covered entity has entrusted to the business associate. Further, section 13422 of the HITECH Act provides that each reference in the Privacy subtitle of the Act to a provision of the HIPAA Rules refers to such provision as in effect on the date of enactment of the Act or to the most recent update of such provision (emphasis added). Thus, the Act does not bar the Department from modifying definitions of terms in the HIPAA Rules to which the Act refers. Rather, the statute expressly contemplates that modifications to the terms may be necessary to carry out the provisions of the Act or for other purposes. Further, we do not agree that covered entities will be confused and seek to establish direct business associate contracts with subcontractors or will prohibit business associates from engaging subcontractors to perform functions or services that require access to protected health information. The final rule makes clear that a covered entity is not required to enter into a contract or other arrangement with a business associate that is a subcontractor. See §§ 164.308(b)(1) and 164.502(e)(1)(i). In addition, as commenters did not present direct evidence to the contrary, we do not believe that covered entities will begin E:\FR\FM\25JAR2.SGM 25JAR2 sroberts on DSK5SPTVN1PROD with 5574 Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations prohibiting business associates from engaging subcontractors as a result of the final rule, in cases where they were not doing so before. Rather, we believe that making subcontractors directly liable for violations of the applicable provisions of the HIPAA Rules will help to alleviate concern on the part of covered entities that protected health information is not adequately protected when provided to subcontractors. The Department also believes that the privacy and security protections for an individual’s personal health information and associated liability for noncompliance with the Rules should not lapse beyond any particular business associate that is a subcontractor. Thus, under the final rule, covered entities must ensure that they obtain satisfactory assurances required by the Rules from their business associates, and business associates must do the same with regard to subcontractors, and so on, no matter how far ‘‘down the chain’’ the information flows. This ensures that individuals’ health information remains protected by all parties that create, receive, maintain, or transmit the information in order for a covered entity to perform its health care functions. For example, a covered entity may contract with a business associate (contractor), the contractor may delegate to a subcontractor (subcontractor 1) one or more functions, services, or activities the business associate has agreed to perform for the covered entity that require access to protected health information, and the subcontractor may in turn delegate to another subcontractor (subcontractor 2) one or more functions, services, or activities it has agreed to perform for the contractor that require access to protected health information, and so on. Both the contractor and all of the subcontractors are business associates under the final rule to the extent they create, receive, maintain, or transmit protected health information. With respect to requests for specific guidance on who is and is not a subcontractor, we believe the above changes to the definition provide further clarity. We also provide the following in response to specific comments. Disclosures by a business associate pursuant to § 164.504(e)(4) and its business associate contract for its own management and administration or legal responsibilities do not create a business associate relationship with the recipient of the protected health information because such disclosures are made outside of the entity’s role as a business associate. However, for such disclosures that are not required by law, the Rule VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 requires that the business associate obtain reasonable assurances from the person to whom the information is disclosed that it will be held confidentially and used or further disclosed only as required by law or for the purposes for which it was disclosed to the person and the person notifies the business associate of any instances of which it is aware that the confidentiality of the information has been breached. See § 164.504(e)(4)(ii)(B). In contrast, disclosures of protected health information by the business associate to a person who will assist the business associate in performing a function, activity, or service for a covered entity or another business associate may create a business associate relationship depending on the circumstances. For example, an entity hired by a business associate to appropriately dispose of documents that contain protected health information is also a business associate and subject to the applicable provisions of the HIPAA Rules. If the documents to be shredded do not contain protected health information, then the entity is not a business associate. We also clarify that the same interpretations that apply to determining whether a first tier contractor is a business associate also apply to determining whether a subcontractor is a business associate. Thus, our interpretation of who is and is not excluded from the definition of business associate as a conduit also applies in the context of subcontractors as well. We refer readers to the above discussion regarding transmission services and conduits. iv. Exceptions to Business Associate Proposed Rule Sections 164.308(b)(2) and 164.502(e)(1)(ii) of the HIPAA Rules currently describe certain circumstances, such as when a covered entity discloses protected health information to a health care provider concerning the treatment of an individual, in which a covered entity is not required to enter into a business associate contract or other arrangement with the recipient of the protected health information. We proposed to move these provisions to the definition of ‘‘business associate’’ itself as exceptions to make clear that the Department does not consider the recipients of the protected health information in these circumstances to be business associates. The movement of these exceptions also was intended to help clarify that a person or an entity is a business associate if the person or PO 00000 Frm 00010 Fmt 4701 Sfmt 4700 entity meets the definition of ‘‘business associate,’’ even if a covered entity, or business associate with respect to a subcontractor, fails to enter into the required business associate contract with the person or entity. Final Rule The Department did not receive substantive public comment on this proposal. The final rule includes the exceptions within the definition of ‘‘business associate.’’ v. Technical Changes to the Definition Proposed Rule For clarity and consistency, we also proposed to change the term ‘‘individually identifiable health information’’ in the current definition of ‘‘business associate’’ to ‘‘protected health information,’’ since a business associate has no obligation under the HIPAA Rules with respect to individually identifiable health information that is not protected health information. Final Rule The Department did not receive substantive public comment on this proposal. The final rule adopts the proposed modification to the definition. Additionally, as indicated above, we have revised the definition of business associate to clarify that a business associate includes an entity that ‘‘creates, receives, maintains, or transmits’’ protected health information on behalf of a covered entity. This change is intended to make the definition more consistent with language at § 164.308(b) of the Security Rule and § 164.502(e) of the Privacy Rule, as well as to clarify that entities that maintain or store protected health information on behalf of a covered entity are business associates, even if they do not actually view the protected health information. vi. Response to Other Public Comments Comment: One commenter suggested that some covered entities do not treat third party persons that handle protected health information onsite as a business associate. Response: A covered entity may treat a contractor who has his or her duty station onsite at a covered entity and who has more than incidental access to protected health information as either a member of the covered entity’s workforce or as a business associate for purposes of the HIPAA Rules. Comment: A few commenters asked for confirmation that researchers are not considered business associates. In addition, the Secretary’s Advisory E:\FR\FM\25JAR2.SGM 25JAR2 sroberts on DSK5SPTVN1PROD with Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations Committee on Human Research Protections, in its November 23, 2010, letter to the Secretary providing comments on the NPRM, asked the Department to confirm that outsourced research review, approval, and continuing oversight functions (such as through using an external or independent Institutional Review Board) similarly do not give rise to a business associate relationship. Response: A person or entity is a business associate only in cases where the person or entity is conducting a function or activity regulated by the HIPAA Rules on behalf of a covered entity, such as payment or health care operations, or providing one of the services listed in the definition of ‘‘business associate,’’ and in the performance of such duties the person or entity has access to protected health information. Thus, an external researcher is not a business associate of a covered entity by virtue of its research activities, even if the covered entity has hired the researcher to perform the research. See https://www.hhs.gov/ocr/ privacy/hipaa/faq/business_associates/ 239.html. Similarly, an external or independent Institutional Review Board is not a business associate of a covered entity by virtue of its performing research review, approval, and continuing oversight functions. However, a researcher may be a business associate if the researcher performs a function, activity, or service for a covered entity that does fall within the definition of business associate, such as the health care operations function of creating a de-identified or limited data set for the covered entity. See paragraph (6)(v) of the definition of ‘‘health care operations.’’ Where the researcher is also the intended recipient of the de-identified data or limited data set, the researcher must return or destroy the identifiers at the time the business associate relationship to create the data set terminates and the researcher now wishes to use the deidentified data or limited data set (subject to a data use agreement) for a research purpose. Comment: A few commenters asked for clarification as to whether the business associate provisions applied to banking and financial institutions. Commenters sought clarification as to whether the exemption at § 1179 of the HIPAA statute for financial institutions was applicable to subcontractors. Response: This final rule is not intended to affect the status of financial institutions with respect to whether they are business associates. The HIPAA Rules, including the business associate provisions, do not apply to banking and VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 financial institutions with respect to the payment processing activities identified in § 1179 of the HIPAA statute, for example, the activity of cashing a check or conducting a funds transfer. Section 1179 of HIPAA exempts certain activities of financial institutions from the HIPAA Rules, to the extent that these activities constitute authorizing, processing, clearing, settling, billing, transferring, reconciling, or collecting payments for health care or health plan premiums. However, a banking or financial institution may be a business associate where the institution performs functions above and beyond the payment processing activities identified above on behalf of a covered entity, such as performing accounts receivable functions on behalf of a health care provider. We clarify that our inclusion of subcontractors in the definition of business associate does not impact the exclusion of financial institutions from the definition of ‘‘business associates’’ when they are only conducting payment processing activities that fall under § 1179 of the HIPAA statute. Accordingly, a business associate need not enter into a business associate agreement with a financial institution that is solely conducting payment activities that are excluded under § 1179. Comment: One commenter sought clarification of the status of a risk management group or malpractice insurance company that receives protected health information when contracted with a covered entity to mitigate the covered entity’s risk and then contracts with legal groups to represent the covered entity during malpractice claims. Response: A business associate agreement is not required where a covered entity purchases a health plan product or other insurance, such as medical liability insurance, from an insurer. However, a business associate relationship could arise if the insurer is performing a function on behalf of, or providing services to, the covered entity that does not directly relate to the provision of insurance benefits, such as performing risk management or assessment activities or legal services for the covered entity, that involve access to protected health information. b. Definition of ‘‘Electronic Media’’ Proposed Rule The term ‘‘electronic media’’ was originally defined in the Transactions and Code Sets Rule issued on August 17, 2000 (65 FR 50312) and was included in the definitions at § 162.103. PO 00000 Frm 00011 Fmt 4701 Sfmt 4700 5575 That definition was subsequently revised and moved to § 160.103. The purpose of that revision was to clarify that the physical movement of electronic media from place to place is not limited to magnetic tape, disk, or compact disk, so as to allow for future technological innovation. We further clarified that transmission of information not in electronic form before the transmission (e.g., paper or voice) is not covered by this definition. See 68 FR 8339, Feb. 20, 2003. In the NPRM, we proposed to revise the definition of ‘‘electronic media’’ in the following ways. First, we proposed to revise paragraph (1) of the definition to replace the term ‘‘electronic storage media’’ with ‘‘electronic storage material’’ to conform the definition of ‘‘electronic media’’ to its current usage, as set forth in the National Institute for Standards and Technology (NIST) ‘‘Guidelines for Media Sanitization’’ (Definition of Medium, NIST SP 800–88, Glossary B, p. 27 (2006)). The NIST definition, which was updated subsequent to the issuance of the Privacy and Security Rules, was developed in recognition of the likelihood that the evolution of the development of new technology would make use of the term ‘‘electronic storage media’’ obsolete in that there may be ‘‘storage material’’ other than ‘‘media’’ that house electronic data. Second, we proposed to add to paragraph (2) of the definition of ‘‘electronic media’’ a reference to intranets, to clarify that intranets come within the definition. Third, we proposed to change the word ‘‘because’’ to ‘‘if’’ in the final sentence of paragraph (2) of the definition of ‘‘electronic media.’’ The definition assumed that no transmissions made by voice via telephone existed in electronic form before transmission; the evolution of technology has made this assumption obsolete since some voice technology is digitally produced from an information system and transmitted by phone. Overview of Public Comments The Department received comments in support of the revised definition and the flexibility created to account for later technological developments. Certain other commenters raised concerns that changes to the definition could have unintended impacts when applied to the administrative transaction and code set requirements. One commenter specifically supported the change in language from ‘‘because’’ to ‘‘if,’’ noting the distinction was important to provide protection for digital audio recordings containing protected health information. One commenter suggested including the E:\FR\FM\25JAR2.SGM 25JAR2 5576 Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations sroberts on DSK5SPTVN1PROD with word ‘‘immediately’’ in the final sentence of paragraph (2) to indicate that fax transmissions are excluded from the definition of electronic media if the information being exchanged did not exist in electronic form immediately before the transmission. Several commenters sought clarification as to whether data that is retained in office machines, such as facsimiles and photocopiers, is subject to the Privacy and Security Rules. Final Rule The final rule adopts the definition as proposed with two additional modifications. First, in paragraph (2) we remove the parenthetical language referring to ‘‘wide open’’ with respect to the Internet and ‘‘using Internet technology to link a business with information accessible only to collaborating parties’’ with respect to extranets and intranets. The parenthetical language initially helped clarify what was intended by key words within the definition. As these key words have become more generally understood and guidance has become available through the NIST regarding specific key terms, such as intranet, extranet, and internet, (see, for example, NIST IR 7298 Revision 1, Glossary of Key Information Security Terms, February 2011, available at https:// csrc.nist.gov/publications/nistir/ir7298rev1/nistir-7298-revision1.pdf), we believe the parenthetical language is no longer helpful. Second, we do accept the recommendation that we alter the language in paragraph (2) to include the word ‘‘immediately,’’ to exclude transmissions when the information exchanged did not exist in electronic form immediately before transmission. This modification clarifies that a facsimile machine accepting a hardcopy document for transmission is not a covered transmission even though the document may have originated from printing from an electronic file. We do not believe these changes will have unforeseen impacts on the application of the term in the transactions and code sets requirements at Part 162. In response to commenters’ concerns that photocopiers, facsimiles, and other office machines may retain electronic data, potentially storing protected health information when used by covered entities or business associates, we clarify that protected health information stored, whether intentionally or not, in photocopier, facsimile, and other devices is subject to the Privacy and Security Rules. Although such devices are not generally relied upon for storage and access to VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 stored information, covered entities and business associates should be aware of the capabilities of these devices to store protected health information and must ensure any protected health information stored on such devices is appropriately protected and secured from inappropriate access, such as by monitoring or restricting physical access to a photocopier or a fax machine that is used for copying or sending protected health information. Further, before removal of the device from the covered entity or business associate, such as at the end of the lease term for a photocopier machine, proper safeguards should be followed to remove the electronic protected health information from the media. c. Definition of ‘‘Protected Health Information’’ Proposed Rule For consistency with the proposed modifications to the period of protection for decedent information at § 164.502(f) (discussed below), the Department proposed to modify the definition of ‘‘protected health information’’ at § 160.103 to provide that the Privacy and Security Rules do not protect the individually identifiable health information of persons who have been deceased for more than 50 years. Overview of Public Comment The public comments received on this proposal are discussed and responded to below in the section describing the modifications to § 164.502(f). Final Rule For the reasons stated in the section regarding § 164.502(f), the final rule adopts the proposed modification to the definition of ‘‘protected health information.’’ d. Definition of ‘‘State’’ Proposed Rule The HITECH Act at section 13400 includes a definition of ‘‘State’’ to mean ‘‘each of the several States, the District of Columbia, Puerto Rico, the Virgin Islands, Guam, American Samoa, and the Northern Mariana Islands.’’ This definition varies from paragraph (2) of the HIPAA definition of ‘‘State’’ at § 160.103, which does not include reference to American Samoa and the Northern Mariana Islands. Thus, for consistency with the definition applied to the HIPAA Rules by the HITECH Act, we proposed to add reference to American Samoa and the Commonwealth of the Northern Mariana Islands in paragraph (2) of the definition of ‘‘State’’ at § 160.103. PO 00000 Frm 00012 Fmt 4701 Sfmt 4700 Final Rule The Department did not receive substantive public comment on this proposal and the final rule adopts the proposed modifications to the definition of ‘‘State.’’ e. Other Changes to the Definitions in Section 160.103 In addition to the changes discussed above, the final rule makes the following changes as proposed in the NPRM to various definitions in § 160.103: (1) Relocates the definitions of ‘‘administrative simplification provision,’’ ‘‘ALJ,’’ ‘‘civil money penalty,’’ ‘‘respondent,’’ and ‘‘violation or violate’’ from § 160.302 to § 160.103 for ease of reference; (2) Adds a reference to sections 13400–13424 of the HITECH Act to the definition of ‘‘administrative simplification provision’’; (3) Removes a comma from the definition of ‘‘disclosure’’ inadvertently inserted into the definition in a prior rulemaking; (4) Replaces the term ‘‘individually identifiable health information’’ with ‘‘protected health information’’ in the definition of ‘‘standard’’ to better reflect the scope of the Privacy and Security Rules; (5) Adds a reference to ‘‘business associate’’ following the reference to ‘‘covered entity’’ in the definitions of ‘‘respondent’’ and ‘‘compliance date,’’ in recognition of the potential liability imposed on business associates for violations of certain provisions of the Privacy and Security Rules by sections 13401 and 13404 of the Act; and (6) Revises the definition of ‘‘workforce member’’ in § 160.103 to make clear that the term includes the employees, volunteers, trainees, and other persons whose conduct, in the performance of work for a business associate, is under the direct control of the business associate, because some provisions of the Act and the Privacy and Security Rules place obligations on the business associate with respect to workforce members. 4. Subpart B—Preemption of State Law a. Section 160.201—Statutory Basis Proposed Rule We proposed to modify § 160.201 regarding the statutory basis for the preemption of State law provisions to add a reference to section 264(c) of HIPAA, which contains the statutory basis for the exception to preemption at § 160.203(b) for State laws that are more stringent than the HIPAA Privacy Rule. We also proposed to add a reference to E:\FR\FM\25JAR2.SGM 25JAR2 Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations section 13421(a) of the HITECH Act, which applies HIPAA’s preemption rules to the HITECH Act’s privacy and security provisions. Finally, we proposed to re-title the provision to read ‘‘Statutory basis’’ instead of ‘‘Applicability.’’ Overview of Public Comments Final Rule The final rule adopts the proposed modifications. In response to the comments concerned with the lack of uniform Federal and State privacy laws, we note that the preemption provisions of the HIPAA Rules are based on section 1178 of the Social Security Act and section 264(c)(2) of HIPAA. Through these statutory provisions, Congress made clear that the HIPAA privacy requirements are to supersede only contrary provisions of State law, and not even in all such cases, such as where the provision of State law provides more stringent privacy protections than the HIPAA Privacy Rule. Accordingly, the HIPAA Privacy Rule provides a Federal floor of privacy protections, with States free to impose more stringent privacy protections should they deem appropriate. b. Section 160.202—Definitions i. Definition of ‘‘Contrary’’ sroberts on DSK5SPTVN1PROD with Proposed Rule The term ‘‘contrary’’ is defined in § 160.202 to make clear when the preemption provisions of HIPAA apply to State law. For the reasons set forth on page 40875 of the July 2010 NPRM, we proposed to amend the definition of ‘‘contrary’’ by inserting references to business associates in paragraph (1) of the definition. We also expanded the reference to the HITECH statutory provisions in paragraph (2) of the definition to encompass all of the sections of subtitle D of the HITECH Act, rather than merely to section 13402, which was added by the breach notifications interim final rule. These 18:57 Jan 24, 2013 Jkt 229001 Final Rule The Department did not receive substantive public comment on this proposal. The final rule adopts the proposed modifications. ii. Definition of ‘‘More Stringent’’ Several commenters expressed concerns about the lack of uniform Federal and State privacy laws and the resultant confusion and expense associated with determining which laws apply to a given circumstance, particularly as more and more health care entities operate across multiple state lines. Commenters recommended that the Department make efforts to engage States and other partners to examine divergent Federal and State requirements and to attempt to coordinate various disclosure rules to drive Federal-State consensus. VerDate Mar<15>2010 changes would give effect to section 13421(a). Proposed Rule The term ‘‘more stringent’’ is part of the statutory preemption language under HIPAA. HIPAA preempts State law that is contrary to a HIPAA privacy standard unless, among other exceptions, the State law is more stringent than the contrary HIPAA privacy standard. We proposed to amend the definition to add a reference to business associates. Final Rule The Department did not receive substantive public comment on this proposal. The final rule adopts the proposed modification. B. Subparts C and D of Part 160: Amendments to the Enforcement Rule Section 13410 of the HITECH Act made several amendments to the Social Security Act to strengthen the HIPAA Enforcement Rule, which applies to the Secretary’s enforcement of all of the HIPAA Administrative Simplification Rules, as well as the Breach Notification Rule. On October 30, 2009, the Department issued an interim final rule (IFR) revising the Enforcement Rule to incorporate the provisions of section 13410(d) of the HITECH Act that took effect immediately to apply to violations of the HIPAA Rules occurring after the enactment date of February 18, 2009. See 74 FR 56123. In general, section 13410(d) of the HITECH Act revised section 1176(a) of the Social Security Act to establish four categories of violations that reflect increasing levels of culpability and four corresponding tiers of penalty amounts that significantly increased the minimum penalty amount for each violation, with a maximum penalty amount of $1.5 million annually for all violations of an identical provision. Section 13410(d) also amended section 1176(b) of the Social Security Act by removing the previous affirmative defense to the imposition of penalties if the covered entity did not know and with the exercise of reasonable diligence would not have known of the violation (these violations are now punishable under the lowest tier of penalties), and by providing a prohibition on the imposition of penalties for any violation PO 00000 Frm 00013 Fmt 4701 Sfmt 4700 5577 that is timely corrected, as long as the violation was not due to willful neglect. The IFR updated the HIPAA Enforcement Rule to reflect these statutory amendments. The IFR did not make amendments with respect to those enforcement provisions of section 13410 of the HITECH Act that were not effective immediately upon enactment. In its July 2010 NPRM, the Department proposed a number of additional modifications to the Enforcement Rule to reflect other provisions of section 13410 of the HITECH Act, some of which became effective on February 18, 2010, or were to become effective at a later date: (1) Requiring that the Secretary formally investigate complaints indicating violations due to willful neglect, and impose civil money penalties upon finding violations due to willful neglect; (2) making business associates of covered entities directly liable for civil money penalties for violations of certain provisions of the HIPAA Rules; (3) requiring the Secretary to determine civil money penalty amounts based upon the nature and extent of the harm resulting from a violation; and (4) providing that the Secretary’s authority to impose a civil money penalty will be barred only to the extent a criminal penalty has been imposed with respect to an act under Section 1177, rather than in cases in which the act constitutes an offense that is criminally punishable under Section 1177. The following discussion describes the enforcement provisions of the IFR and the NPRM, responds to public comment received by the Department on both rules, and describes the final modifications to the Enforcement Rule adopted by this final rule. In addition to the modifications discussed below, this final rule also adopts the NPRM proposal to add the term ‘‘business associate’’ to the following provisions of the Enforcement Rule: §§ 160.300; 160.304; 160.306(a) and (c); 160.308; 160.310; 160.312; 160.316; 160.401; 160.402; 160.404(b); 160.406; 160.408(c) and (d); and 160.410(a) and (c). This is done to implement sections 13401 and 13404 of the Act, which impose direct civil money penalty liability on business associates for their violations of certain provisions of the HIPAA Rules. E:\FR\FM\25JAR2.SGM 25JAR2 5578 Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations 1. Subpart C of Part 160—Compliance and Investigations a. Sections 160.304, 160.306, 160.308, and 160.312—Noncompliance Due to Willful Neglect sroberts on DSK5SPTVN1PROD with Proposed Rule Section 13410(a) of the HITECH Act adds a new subsection (c) to section 1176 of the Social Security Act, which requires the Department to formally investigate a complaint if a preliminary investigation of the facts of the complaint indicates a possible violation due to willful neglect (section 1176(c)(2)) and to impose a civil money penalty for a violation due to willful neglect (section 1176(c)(1)). The Department proposed a number of modifications to Subpart C of the Enforcement Rule to implement these provisions. First, § 160.306(c) of the Enforcement Rule currently provides the Secretary with discretion to investigate HIPAA complaints through the use of the word ‘‘may.’’ As a practical matter, however, the Department currently conducts a preliminary review of every complaint received and proceeds with the investigation in every eligible case where its preliminary review of the facts indicates a possible violation of the HIPAA Rules. Nonetheless, to implement section 1176(c)(2), the Department proposed to add a new paragraph (1) to § 160.306(c) (and to make conforming changes to the remainder of § 160.306(c)) to make clear that the Secretary will investigate any complaint filed under this section when a preliminary review of the facts indicates a possible violation due to willful neglect. Under proposed § 160.306(c)(2), the Secretary would have continued discretion with respect to investigating any other complaints. Second, the Department proposed to modify § 160.308 by adding a new paragraph (a) to provide that the Secretary will conduct a compliance review to determine whether a covered entity or business associate is complying with the applicable administrative simplification provision when a preliminary review of the facts indicates a possible violation due to willful neglect. Like § 160.306(c) with respect to complaints, the current § 160.308(c) provides the Secretary with discretion to conduct compliance reviews. While section 13410(a) of the HITECH Act specifically mentions complaints and not compliance reviews with respect to willful neglect, the Department proposed to treat compliance reviews in the same manner because it believed doing so would VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 strengthen enforcement with respect to potential violations of willful neglect and would ensure that investigations, whether or not initiated by a complaint, would be handled in a consistent manner. Under proposed § 160.308(b), the Secretary would continue to have discretion to conduct compliance reviews in circumstances not indicating willful neglect. Third, given the HITECH Act’s requirement that the Secretary impose a penalty for any violation due to willful neglect, the Department proposed changes to § 160.312, which currently requires the Secretary to attempt to resolve investigations or compliance reviews indicating noncompliance by informal means. The NPRM proposed to provide instead in § 160.312(a) that the Secretary ‘‘may’’ rather than ‘‘will’’ attempt to resolve investigations or compliance reviews indicating noncompliance by informal means. This change would permit the Department to proceed with a willful neglect violation determination as appropriate, while also permitting the Department to seek resolution of complaints and compliance reviews that did not indicate willful neglect violations by informal means (e.g., where the covered entity or business associate did not know and by exercising reasonable diligence would not have known of a violation, or where the violation is due to reasonable cause). Finally, the Department proposed a conforming change to § 160.304(a), which currently requires the Secretary to seek, to the extent practicable, the cooperation of covered entities in obtaining compliance with the HIPAA Rules. The NPRM proposed to clarify that the Secretary would continue to do so ‘‘consistent with the provisions of this subpart’’ in recognition of the new HITECH Act requirement to impose a civil money penalty for a violation due to willful neglect. While the Secretary often will still seek to correct indications of noncompliance through voluntary corrective action, there may be circumstances (such as circumstances indicating willful neglect), where the Secretary may proceed directly to formal enforcement. Overview of Public Comments One commenter supported maintaining the current language at §§ 160.306 and 160.308 of the Enforcement Rule, providing the Secretary with discretion to conduct complaint investigations and compliance reviews, regardless of indications of willful neglect. One commenter suggested that OCR look to whether facts indicate a ‘‘probable,’’ PO 00000 Frm 00014 Fmt 4701 Sfmt 4700 rather than ‘‘possible,’’ violation due to willful neglect to limit the likelihood of unnecessary formal investigations or compliance reviews. While one commenter supported the proposal to require a compliance review in circumstances indicating a possible violation due to willful neglect, others argued that requiring compliance reviews in such circumstances is not required by the statute, will detract from resources to investigate complaints, and will be duplicative if a formal complaint investigation is also underway. Several commenters expressed concern over the proposal at § 160.312(a) to give the Secretary discretion, rather than to require the Secretary, to attempt to resolve investigations or compliance reviews indicating noncompliance by informal means, even in cases of noncompliance that did not involve willful neglect (e.g., cases involving reasonable cause or lack of knowledge of a violation). Commenters indicated support for the Department’s seeking compliance through voluntary corrective action as opposed to formal enforcement proceedings and argued that the Department should retain the requirement for the Secretary to attempt informal resolution in all circumstances except those involving willful neglect. One commenter recommended that the Secretary be able to assess penalties regardless of whether corrective action was obtained. Final Rule The final rule adopts the modifications to §§ 160.304, 160.306, 160.308, and 160.312, as proposed in the NPRM. The Department believes these changes to the enforcement provisions to be appropriate given the HITECH Act’s requirements at section 13410(a) with respect to circumstances indicating or involving noncompliance due to willful neglect. We do not provide in the Rule that the Secretary will investigate when a preliminary review of the facts indicates a ‘‘probable’’ rather than ‘‘possible’’ violation due to willful neglect as the statute requires an investigation even in cases indicating a ‘‘possible’’ violation due to willful neglect. In response to commenters concerned about requiring the Secretary to conduct compliance reviews in circumstances in which facts indicate a possible violation due to willful neglect, we continue to believe that, while not expressly required by the statute, doing so appropriately strengthens enforcement with respect to violations due to willful neglect and ensures consistency in the handling of complaints and compliance reviews in E:\FR\FM\25JAR2.SGM 25JAR2 Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations which violations due to willful neglect are indicated. We emphasize that the Department retains discretion to decide whether to conduct a compliance review (or complaint investigation) where a preliminary review of the facts indicates a degree of culpability less than willful neglect. Further, with respect to commenter concerns about duplication between complaint investigations and compliance reviews, we clarify that the Department generally conducts compliance reviews to investigate allegations of violations of the HIPAA Rules brought to the Department’s attention through a mechanism other than a complaint. For example, the Department may use a compliance review to investigate allegations of violations of the Rules brought to our attention through a media report, or from a State or another Federal agency. If the Department initiates an investigation of a complaint because its preliminary review of the facts indicates a possible violation due to willful neglect, the Department is not also required to initiate a compliance review under § 160.308 because doing so would initiate a duplicative investigation. With respect to § 160.312, where the Rule previously mandated that the Secretary attempt to resolve indicated violations of the HIPAA Rules by informal means, the final rule now provides the Secretary with the discretion to do so, to reflect Section 13410 of the HITECH Act with regard to violations due to willful neglect. Nothing in Section 13410 of the HITECH Act limits the Secretary’s ability to resolve such cases by informal means. However, through its introduction of higher penalties and its mandate for formal investigations with regard to possible violations due to willful neglect, Section 13410 strengthens enforcement and accordingly we have revised § 160.312 so that the Secretary may move directly to a civil money penalty without exhausting informal resolution efforts at her discretion, particularly in cases involving willful neglect violations. sroberts on DSK5SPTVN1PROD with Response to Other Public Comments Comment: A number of commenters requested further clarification on the scope and depth of what constitutes a ‘‘preliminary review of the facts’’ for purposes of determining whether facts indicate a possible violation due to willful neglect and thus, warrant a formal complaint investigation or compliance review. Certain commenters suggested that a preliminary review of the facts should go beyond merely a VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 review of the allegations asserted in a complaint. Response: As noted above, currently the Department conducts a preliminary review of every complaint received and proceeds with the investigation in every eligible case where its preliminary review of the facts indicates a possible violation of the HIPAA Rules. The Department anticipates that some complaints, on their face, or reports or referrals that form the basis of a potential compliance review, will contain sufficient information to indicate a possible violation due to willful neglect, and some may not. In any event, the Department may on a case-by-case basis expand the preliminary review and conduct additional inquiries for purposes of identifying a possible violation due to willful neglect. Notwithstanding the scope of a preliminary review, OCR will determine if an indicated violation was due to willful neglect based on the evidence from its investigation of the allegations, even if a violation due to willful neglect was not indicated at the preliminary review stage. b. Section 160.310—Protected Health Information Obtained by the Secretary Proposed Rule Section 160.310 requires that covered entities make information available to and cooperate with the Secretary during complaint investigations and compliance reviews. Section 160.310(c)(3) provides that any protected health information obtained by the Secretary in connection with an investigation or compliance review will not be disclosed by the Secretary, except as necessary for determining and enforcing compliance with the HIPAA Rules or as otherwise required by law. In the proposed rule, we proposed to modify this paragraph to also allow the Secretary to disclose protected health information if permitted under the Privacy Act at 5 U.S.C. 552a(b)(7). Section 5 U.S.C. 552a(b)(7) permits the disclosure of a record on an individual contained within a government system of records protected under the Privacy Act to another agency or instrumentality of any governmental jurisdiction within or under the control of the United States for a civil or criminal law enforcement activity if the activity is authorized by law and if the agency has made a written request to the agency that maintains the record. The proposed change would permit the Secretary to coordinate with other law enforcement agencies, such as the State Attorneys General pursuing civil actions to enforce the HIPAA Rules on behalf of State PO 00000 Frm 00015 Fmt 4701 Sfmt 4700 5579 residents pursuant to section 13410(e) of the Act, or the FTC pursuing remedies under other consumer protection authorities. Overview of Public Comments One commenter requested clarification and transparency on how or if Federal regulators such as OCR and the FTC will collaborate, when such information sharing will be initiated or occur as a routine process, or whether Federal and State agencies will work together to enforce suspected violations. Final Rule To facilitate cooperation between the Department and other law enforcement agencies, the final rule adopts the modifications to § 160.310(c)(3) as proposed in the NPRM. In response to the comment regarding transparency in how the Department is or will cooperate with other agencies in enforcement, we note that the Department’s web site at https://www.hhs.gov/ocr/enforcement/ contains information about how the Department coordinates with the Department of Justice to refer cases involving possible criminal HIPAA violations and how the Department has worked with the FTC to coordinate enforcement actions for violations that implicate both HIPAA and the FTC Act. Further, the Department will be working closely with State Attorneys General to coordinate enforcement in appropriate cases, as provided under section 13410(e) of the HITECH Act. The Department will continue to update its web site as necessary and appropriate to maintain transparency with the public and the regulated community about these coordinated activities and its other enforcement actions and activities. 2. Subpart D—Imposition of Civil Money Penalties a. Section 160.401—Definitions Section 160.401 defines ‘‘reasonable cause,’’ ‘‘reasonable diligence,’’ and ‘‘willful neglect.’’ Given that section 13410(d) of the HITECH Act uses these terms to describe the increasing levels of culpability for which increasing minimum levels of penalties may be imposed, the Department moved these definitions in the IFR from their prior placement at § 160.410, which pertains only to affirmative defenses, to § 160.401, so that they would apply to the entirety of Subpart D of Part 160 and the provisions regarding the imposition of civil money penalties. The IFR did not modify the definitions themselves as the HITECH Act did not amend the definitions. Even though the HITECH Act did not amend the definitions of these terms, E:\FR\FM\25JAR2.SGM 25JAR2 5580 Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations the Department in its NPRM proposed certain modifications to the definition of ‘‘reasonable cause’’ to clarify the mens rea (state of mind) required for this category of violations, and to avoid the situation where certain violations would not fall within one of the established penalty tiers. This modification is discussed below. The Department did not propose modifications to the definitions of ‘‘reasonable diligence’’ and ‘‘willful neglect.’’ In the NPRM, the Department also included examples and guidance as to how the Department planned to apply the definitions of ‘‘reasonable cause,’’ ‘‘reasonable diligence,’’ and ‘‘willful neglect’’ to distinguish among the tiers of culpability. 75 FR 40877–40879. As commenters generally found this guidance helpful, the Department intends to publish the guidance on its web site. Modifications to the Definition of ‘‘Reasonable Cause’’ sroberts on DSK5SPTVN1PROD with Proposed Rule Reasonable cause is currently defined at § 160.401 to mean: ‘‘circumstances that would make it unreasonable for the covered entity, despite the exercise of ordinary business care and prudence, to comply with the administrative simplification provision violated.’’ This definition is consistent with the Supreme Court’s ruling in United States v. Boyle, 469 U.S. 241, 245 (1985), which focused on whether circumstances were beyond the regulated person’s control, thereby making compliance unreasonable. See 70 FR 20224, 20238. Prior to the HITECH Act, section 1176 of the Social Security Act provided an affirmative defense to the imposition of a civil money penalty if the covered entity established that its violation was due to reasonable cause and not willful neglect and was corrected within a 30-day period (or such additional period determined by the Secretary to be appropriate). As described above, section 13410(d) of the HITECH Act revised section 1176 of the Social Security Act to establish four tiers of increasing penalty amounts to correspond to the levels of culpability associated with the violation. The first category of violation (and lowest penalty tier) covers situations where the covered entity or business associate did not know, and by exercising reasonable diligence would not have known, of a violation. The second category of violation (and next highest penalty tier) applies to violations due to reasonable cause and not to willful neglect. The third and fourth categories apply to VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 circumstances where the violation was due to willful neglect that is corrected within a certain time period (second highest penalty tier) and willful neglect that is not corrected (highest penalty tier). The mens rea, or state of mind, associated with the tiers is clear with respect to the first, third, and fourth categories, in that there is no mens rea with respect to the lowest category of violation, while the existence of mens rea is presumed with respect to the third and fourth categories of violation. However, the current definition of ‘‘reasonable cause’’ does not address mens rea with respect to the second category of violations. Therefore, the Department proposed to amend the definition of ‘‘reasonable cause’’ at § 160.401 to clarify the mens rea associated with the reasonable cause category of violations and to clarify the full scope of violations that will come within the category. Specifically, the Department proposed to modify the definition of ‘‘reasonable cause’’ to mean ‘‘an act or omission in which a covered entity or business associate knew, or by exercising reasonable diligence would have known, that the act or omission violated an administrative simplification provision, but in which the covered entity or business associate did not act with willful neglect.’’ Thus, the proposed definition would now include violations due both to circumstances that would make it unreasonable for the covered entity or business associate, despite the exercise of ordinary business care and prudence, to comply with the administrative simplification provision violated, as well as to other circumstances in which a covered entity or business associate has knowledge of a violation but lacks the conscious intent or reckless indifference associated with the willful neglect category of violations. Overview of Public Comments Commenters addressing the definition of ‘‘reasonable cause’’ expressed general support for the proposed clarifications to the scope of this category of violations. Final Rule The final rule adopts the proposed modifications to the definition. b. Section 160.402—Basis for a Civil Money Penalty Proposed Rule Section 160.402(a) states generally that the Secretary will impose a civil money penalty upon a covered entity if the Secretary determines that the covered entity violated an PO 00000 Frm 00016 Fmt 4701 Sfmt 4700 administrative simplification provision. Section 164.402, in paragraphs (b) and (c), provides the basis for a civil money penalty against a covered entity where more than one covered entity is responsible for a violation, where an affiliated covered entity is responsible for a violation, and where an agent of a covered entity is responsible for a violation. The proposed rule proposed to remove the exception at § 160.402(c) for covered entity liability for the acts of its agent in cases where the agent is a business associate, the relevant contract requirements have been met, the covered entity did not know of a pattern or practice of the business associate in violation of the contract, and the covered entity did not fail to act as required by the Privacy or Security Rule with respect to such violations. The proposed rule also proposed to add a parallel provision in a new paragraph (2) at § 160.402(c) that would provide for civil money penalty liability against a business associate for the acts of its agent. The existing language of § 160.402(c) regarding the liability of covered entities for the acts of their agents would be re-designated as paragraph (1). These proposed changes would make covered entities and business associates liable under § 160.402(c) for the acts of their business associate agents, in accordance with the Federal common law of agency, regardless of whether the covered entity has a compliant business associate agreement in place. Section 160.402(c) closely tracks the language in section 1128A(l) of the Social Security Act, which is made applicable to HIPAA by section 1176(a)(2) of such Act, which states that ‘‘a principal is liable for penalties * * * under this section for the actions of the principal’s agents acting within the scope of the agency.’’ One reason for removing the exception to the general provision at § 160.402(c), as we explained in the NPRM, is to ensure, where a covered entity or business associate has delegated out an obligation under the HIPAA Rules, that a covered entity or business associate would remain liable for penalties for the failure of its business associate agent to perform the obligation on the covered entity or business associate’s behalf. Overview of Public Comments Several commenters requested that the Department clarify and provide additional guidance regarding how the Federal common law of agency applies to business associate relationships. These commenters expressed an overall concern that applying the Federal common law of agency to business E:\FR\FM\25JAR2.SGM 25JAR2 Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations sroberts on DSK5SPTVN1PROD with associate relationships would add unnecessary confusion to and place an undue burden on business associate relationships. Several commenters argued that the proposed change would require covered entities and business associates to determine whether their business associates or business associate subcontractors are agents, resulting in costly and burdensome challenges when drafting business associate contracts and monitoring ongoing relationships. One commenter argued that the Federal common law of agency should not be applied to covered entity and business associate relationships because it does not generally control when the parties have entered into a contractual agreement that specifies their respective rights and obligations. Instead, the commenter argued, the contractual provisions control, and are interpreted and enforced in accordance with State law specified by the contract. Final Rule This final rule adopts the proposed modifications to § 160.402(c). We do not believe that this change will place an undue burden on covered entities and business associates. As we explained in the NPRM, a covered entity’s liability for acts of its agents is customary under common law. See 75 FR 40880. Further, section 1128A(l) of the Social Security Act, applicable to HIPAA covered entities and now business associates by section 1176(a)(2) of the Act, states that a principal is liable for civil money penalties for the actions of the principal’s agent acting within the scope of agency. Before the changes to § 160.402(c) were finalized in this rule, if a covered entity failed to comply with the business associate provisions in the HIPAA Rules, a covered entity potentially would have been liable for the actions of its business associate agent. Thus, we believe that the notion that a principal is liable for the acts of its agent should not be an unfamiliar concept to covered entities and business associates. However, we appreciate and understand the commenters’ concerns and take this opportunity to provide additional guidance. While section 1128A(l) is silent as to how to define ‘‘principal,’’ ‘‘agent,’’ and ‘‘scope of agency,’’ § 160.402(c) references the Federal common law of agency. As we explained in the Enforcement Rule preamble, 71 FR 8390, 8403–04, adopting the Federal common law to determine the definitions and application of these terms achieves nationwide uniformity in the implementation of the HIPAA Rules. We believe that relying on the Federal common law is particularly VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 important because of HIPAA’s express objective of furthering the efficiency and effectiveness of the health care system as a whole. Further, adopting the Federal common law here is consistent with the precept that Federal statutes are meant to have uniform nationwide application. Therefore, we disagree with the comment that argued that Federal common law should not be applied with respect to relationships between covered entities and business associates. An analysis of whether a business associate is an agent will be fact specific, taking into account the terms of a business associate agreement as well as the totality of the circumstances involved in the ongoing relationship between the parties. The essential factor in determining whether an agency relationship exists between a covered entity and its business associate (or business associate and its subcontractor) is the right or authority of a covered entity to control the business associate’s conduct in the course of performing a service on behalf of the covered entity. The right or authority to control the business associate’s conduct also is the essential factor in determining whether an agency relationship exists between a business associate and its business associate subcontractor. Accordingly, this guidance applies in the same manner to both covered entities (with regard to their business associates) and business associates (with regard to their subcontractors). The authority of a covered entity to give interim instructions or directions is the type of control that distinguishes covered entities in agency relationships from those in non-agency relationships. A business associate generally would not be an agent if it enters into a business associate agreement with a covered entity that sets terms and conditions that create contractual obligations between the two parties. Specifically, if the only avenue of control is for a covered entity to amend the terms of the agreement or sue for breach of contract, this generally indicates that a business associate is not acting as an agent. In contrast, a business associate generally would be an agent if it enters into a business associate agreement with a covered entity that granted the covered entity the authority to direct the performance of the service provided by its business associate after the relationship was established. For example, if the terms of a business associate agreement between a covered entity and its business associate stated that ‘‘a business associate must make available protected health information in accordance with § 164.524 based on the instructions to be PO 00000 Frm 00017 Fmt 4701 Sfmt 4700 5581 provided by or under the direction of a covered entity,’’ then this would create an agency relationship between the covered entity and business associate for this activity because the covered entity has a right to give interim instructions and direction during the course of the relationship. An agency relationship also could exist between a covered entity and its business associate if a covered entity contracts out or delegates a particular obligation under the HIPAA Rules to its business associate. As discussed above, whether or not an agency relationship exists in this circumstance again would depend on the right or authority to control the business associate’s conduct in the performance of the delegated service based on the right of a covered entity to give interim instructions. While these principles are well established under the Federal common law of agency, we again note that any analysis regarding scope of agency depends on the facts of each circumstance. Several factors are important to consider in any analysis to determine the scope of agency: (1) The time, place, and purpose of a business associate agent’s conduct; (2) whether a business associate agent engaged in a course of conduct subject to a covered entity’s control; (3) whether a business associate agent’s conduct is commonly done by a business associate to accomplish the service performed on behalf of a covered entity; and (4) whether or not the covered entity reasonably expected that a business associate agent would engage in the conduct in question. The terms, statements, or labels given to parties (e.g., independent contractor) do not control whether an agency relationship exists. Rather, the manner and method in which a covered entity actually controls the service provided decides the analysis. As mentioned above, an analysis of whether a business associate is an agent will be fact specific and consider the totality of the circumstances involved in the ongoing relationship between the parties. We note here several circumstances that are important. The type of service and skill level required to perform the service are relevant factors in determining whether a business associate is an agent. For example, a business associate that is hired to perform de-identification of protected health information for a small provider would likely not be an agent because the small provider likely would not have the expertise to provide interim instructions regarding this activity to the business associate. Also, an agency relationship would not likely exist when a covered entity is legally or E:\FR\FM\25JAR2.SGM 25JAR2 5582 Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations sroberts on DSK5SPTVN1PROD with otherwise prevented from performing the service or activity performed by its business associate. For example, the accreditation functions performed by a business associate cannot be performed by a covered entity seeking accreditation because a covered entity cannot perform an accreditation survey or award accreditation. We also note that a business associate can be an agent of a covered entity: (1) Despite the fact that a covered entity does not retain the right or authority to control every aspect of its business associate’s activities; (2) even if a covered entity does not exercise the right of control but evidence exists that it holds the authority to exercise that right; and (3) even if a covered entity and its business associate are separated by physical distance (e.g., if a covered entity and business associate are located in different countries). Response to Other Public Comments Comment: One commenter asked whether the Department intends to eliminate the exceptions afforded by the Federal common law of agency. This commenter also argued that if a business associate were an agent of a covered entity, and a HIPAA compliant business associate agreement was in place, any deviation from the terms in the agreement would be by definition outside the scope of agency. Response: As we discussed above, § 160.402(c) provides that covered entities and business associates are liable for the acts of their business associate agents, in accordance with the Federal common law of agency. Section 160.402(c) is derived from section 1128A(l) of the Social Security Act which states that ‘‘a principal is liable for penalties * * * under this section for the actions of the principal’s agents acting within the scope of the agency.’’ Accordingly, § 160.402(c) incorporates the Federal common law of agency, which includes the understanding that for a principal to be liable for the actions of an agent, the agent must be acting within the scope of agency. Thus, the exceptions to the Federal common law of agency (as the commenter identified them) are incorporated in the final rule at § 160.402(c). We do not agree with the commenter that any deviation from the terms in a business associate contract would be by definition outside the scope of agency. A business associate agent’s conduct generally is within the scope of agency when its conduct occurs during the performance of the assigned work or incident to such work, regardless of whether the work was done carelessly, a mistake was made in the performance, VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 or the business associate disregarded a covered entity’s specific instruction. For example, a business associate agent would likely be acting within the scope of agency if it impermissibly disclosed more than the minimum necessary information to a health plan for purposes of payment, even if the disclosure is contrary to clear instructions of the covered entity. In contrast, a business associate agent’s conduct generally is outside the scope of agency when its conduct is solely for its own benefit (or that of a third party), or pursues a course of conduct not intended to serve any purpose of the covered entity. Comment: One commenter stated that the proposed change would impose strict liability on covered entities for the actions of third parties not under their control. Another commenter stated that an agent would always fall within the scope of a workforce member, which by definition is not a business associate. Response: We disagree with both comments and believe that the comments may reflect a misunderstanding of the proposed change. First, as explained above, § 160.402(c) closely tracks the language in section 1128A(l) of the Social Security Act, which is made applicable to HIPAA by section 1176(a)(2) of such Act. It does not make a covered entity or business associate liable for the acts of third parties that are not under its control because such third parties are not its agents. With regard to the second comment, an agent could always fall within the definition of a workforce member because of the direct control requirement in that definition, but the definition of business associate excludes a workforce member. This definitional exclusion allows the covered entity to determine whether, for example, to provide training to the agent under the Privacy Rule. A covered entity would be required to provide training to a workforce member but not to a business associate agent. However, the covered entity is required to enter into a business associate agreement with a business associate agent that it does not treat as a workforce member. The proposed change to § 160.402(c) simply makes the covered entity or business associate liable for the acts of its agents acting within the scope of agency, whether the agents are workforce members or business associates. See the definitions of ‘‘business associate’’ and ‘‘workforce member’’ at § 160.103. PO 00000 Frm 00018 Fmt 4701 Sfmt 4700 c. Section 160.404—Amount of a Civil Monetary Penalty Interim Final Rule The IFR amended § 160.404 to revise the range of potential civil money penalty amounts a covered entity (or business associate) will be subject to for violations occurring on or after February 18, 2009, as a result of section 13410(d) of the HITECH Act. Prior to the HITECH Act, section 1176(a) of the Social Security Act authorized the Secretary to impose a civil money penalty of not more than $100 for each violation, with the total amount imposed on a covered entity for all violations of an identical requirement or prohibition during a calendar year not to exceed $25,000. As described above, section 13410(d) of the HITECH Act modified section 1176(a) to establish tiers of increasing penalty amounts for violations based on increasing levels of culpability associated with each tier. Accordingly, the IFR adopted at § 160.404(b) the new penalty scheme provided for at section 13410(d) of the HITECH Act for violations occurring on or after February 18, 2009. The IFR retained the pre-HITECH maximum penalty amounts of not more than $100 per violation and $25,000 for identical violations during a calendar year, for violations occurring before February 18, 2009. In adopting the HITECH Act’s penalty scheme, the Department recognized that section 13410(d) contained apparently inconsistent language (i.e., its reference to two penalty tiers ‘‘for each violation,’’ each of which provided a penalty amount ‘‘for all such violations’’ of an identical requirement or prohibition in a calendar year). To resolve this inconsistency, with the exception of violations due to willful neglect that are not timely corrected, the IFR adopted a range of penalty amounts between the minimum given in one tier and the maximum given in the second tier for each violation and adopted the amount of $1.5 million as the limit for all violations of an identical provision of the HIPAA rules in a calendar year. For violations due to willful neglect that are not timely corrected, the IFR adopted the penalty amount of $50,000 as the minimum for each violation and $1.5 million for all such violations of an identical requirement or prohibition in a calendar year. Specifically, the IFR revised § 160.404 to provide, for violations occurring on or after February 18, 2009, the new HITECH penalty scheme, as follows: (1) For violations in which it is established that the covered entity did not know E:\FR\FM\25JAR2.SGM 25JAR2 Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations and, by exercising reasonable diligence, would not have known that the covered entity violated a provision, an amount not less than $100 or more than $50,000 for each violation; (2) for a violation in which it is established that the violation was due to reasonable cause and not to willful neglect, an amount not less than $1000 or more than $50,000 for each violation; (3) for a violation in which it is established that the violation was due to willful neglect and was timely corrected, an amount not less than $10,000 or more than $50,000 for each violation; and (4) for a violation in which it is established that the violation 5583 was due to willful neglect and was not timely corrected, an amount not less than $50,000 for each violation; except that a penalty for violations of the same requirement or prohibition under any of these categories may not exceed $1,500,000 in a calendar year. See Table 2 below. TABLE 2—CATEGORIES OF VIOLATIONS AND RESPECTIVE PENALTY AMOUNTS AVAILABLE Violation category—Section 1176(a)(1) Each violation (A) Did Not Know ............................................................................................................................. (B) Reasonable Cause .................................................................................................................... (C)(i) Willful Neglect-Corrected ........................................................................................................ (C)(ii) Willful Neglect-Not Corrected ................................................................................................ Some commenters specifically expressed concern about the maximum penalty amounts set forth for each violation (i.e., $50,000) and for all violations of an identical provision in a calendar year ($1,500,000). Commenters argued that the IFR’s penalty scheme is inconsistent with the HITECH Act’s establishment of different tiers based on culpability because the outside limits were the same for all culpability categories and this ignored the outside limits set forth by the HITECH Act within the lower penalty tiers, rendering those limits meaningless. A few commenters expressed particular concern with what they believed to be the unfair ability of the Secretary to impose the maximum penalty amounts to violations falling within the two lowest categories of culpability (i.e., did not know violations and violations due to reasonable cause and not willful neglect). Overview of Public Comments sroberts on DSK5SPTVN1PROD with In applying these amounts, the Department will not impose the maximum penalty amount in all cases but rather will determine the penalty amounts as required by the statute at section 1176(a)(1) and the regulations at § 160.408 (i.e., based on the nature and extent of the violation, the nature and extent of the resulting harm, and the other factors set forth at § 160.408). Further, for counting violations, the Department continues to utilize the methodology discussed in prior preambles of the Enforcement Rule. See 70 FR 20224, 20233–55 (April 18, 2005) and 71 FR 8390, 8404–07 (February 16, 2006). For violations that began prior to February 18, 2009, and continue after that date, the Department will treat violations occurring before February 18, 2009, as subject to the penalties in effect prior to February 18, 2009, and violations occurring on or after February 18, 2009, as subject to the penalties in effect on or after February 18, 2009. This final rule retains the revised penalty structure in § 160.404(b) as implemented by the IFR. We continue to believe the penalty amounts are appropriate and reflect the most logical reading of the HITECH Act, which provides the Secretary with discretion to impose penalties for each category of culpability up to the maximum amount described in the highest penalty tier. With respect to those comments expressing concern about the discretion available to the Secretary under the adopted scheme we emphasize again that the Department will not impose the maximum penalty amount in all cases but will rather determine the amount of a penalty on a case-by-case basis, depending on the nature and extent of the violation and the nature and extent of the resulting harm, as required by the HITECH Act, as well as the other factors Most comments on the civil money penalty amounts expressed concern with the new penalty structure set forth in the IFR. A few of these commenters expressed a generalized concern about the potential impact the available penalty amounts might have on covered entities, particularly smaller entities. One commenter argued that the Secretary should not fine entities for violations of which a covered entity had no knowledge or those due to reasonable cause, and that civil money penalties should only be imposed as a last resort. A few commenters expressed concern with the Secretary’s wide range of discretion in determining a civil money penalty amount and suggested that the regulations or guidance should further define how the Secretary would determine such an amount. VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 Final Rule PO 00000 Frm 00019 Fmt 4701 Sfmt 4700 $100–$50,000 1,000–50,000 10,000–50,000 50,000 All such violations of an identical provision in a calendar year $1,500,000 1,500,000 1,500,000 1,500,000 set forth at § 160.408. In response to those commenters particularly concerned about the impact of penalties on smaller entities, we note that the other factors include both the financial condition and size of the covered entity or business associate. These factors are discussed more fully below. In addition, with respect to comments expressing specific concern about fairness regarding those violations of which an entity did not know or by exercising reasonable diligence would not have known or for which there was a reasonable cause and not willful neglect, we note that in both cases an entity may establish that an affirmative defense applies under § 160.410, where the entity corrects the violation within 30 days from the date the entity had knowledge of the violation or with the exercise of reasonable diligence would have had knowledge of the violation, or during a period determined appropriate by the Secretary based upon the nature and extent of the entity’s failure to comply. These affirmative defenses are described more fully below. In addition, Section 13410(d) of the HITECH Act and Section 1176(a) of the Social Security Act, give the Secretary further ability to waive a civil money penalty, in whole or in part, under certain circumstances. Thus, to the extent an entity fails to correct such violations within the mandated timeframe, the Secretary may also utilize her waiver authority provided for at § 160.412, to waive the penalty amount in whole or in part, to the extent that payment of the penalty would be excessive relative to the violation. Further, pursuant to 42 U.S.C. 1320a– 7a(f), the Secretary always has the discretion to settle any issue or case or to compromise the amount of a civil money penalty assessed for a violation of the HIPAA Rules. E:\FR\FM\25JAR2.SGM 25JAR2 5584 Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations Finally, in the event an entity believes that a civil money penalty has been imposed unfairly, the entity could exercise its right under § 160.504 to appeal the imposition of a civil money penalty in a hearing before an administrative law judge. sroberts on DSK5SPTVN1PROD with Response to Other Public Comments Comment: We received a few comments in response to the IFR and NPRM requesting clarification as to how the Secretary will count violations for purposes of calculating civil money penalties. One commenter requested clarification as to how the numbers of ‘‘occurrences’’ are determined, suggesting that penalties could be very significant, and vary significantly, depending on the counting methodology utilized. The Department also received one comment asking whether a violation is defined as one event. This commenter queried, for example, whether the loss of unsecured electronic media would be considered as a single violation, even if the media contained several hundred records. The commenter also asked for confirmation that $1,500,000 is the aggregate limit of all fines for all violations in a given calendar year which would apply across an entire enterprise, regardless of violations occurring in different business units. Response: How violations are counted for purposes of calculating a civil money penalty vary depending on the circumstances surrounding the noncompliance. Generally speaking, where multiple individuals are affected by an impermissible use or disclosure, such as in the case of a breach of unsecured protected health information, it is anticipated that the number of identical violations of the Privacy Rule standard regarding permissible uses and disclosures would be counted by the number of individuals affected. Further, with respect to continuing violations, such as lack of appropriate safeguards for a period of time, it is anticipated that the number of identical violations of the safeguard standard would be counted on a per day basis (i.e., the number of days the entity did not have appropriate safeguards in place to protect the protected health information). Note also that in many breach cases, there will be both an impermissible use or disclosure, as well as a safeguards violation, for each of which the Department may calculate a separate civil money penalty. We refer readers to prior Enforcement Rule preambles for additional discussion on the counting methodology. See 70 FR 20224, 20233– 55 (April 18, 2005) and 71 FR 8390, 8404–07 (February 16, 2006). VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 With respect to whether the aggregate CMP limit of $1.5 million would apply to all violations in a given calendar year, across an entire enterprise, regardless of violations occurring in different business units of the enterprise, we note that the Enforcement Rule’s penalty scheme, and thus the limit for identical violations in a calendar year applies to the legal entity that is a covered entity or business associate. However, as we indicated above, a covered entity or business associate may be liable for multiple violations of multiple requirements, and a violation of each requirement may be counted separately. As such, one covered entity or business associate may be subject to multiple violations of up to a $1.5 million cap for each violation, which would result in a total penalty above $1.5 million. d. Section 160.408—Factors Considered in Determining the Amount of a Civil Money Penalty Proposed Rule Section 160.408 implements section 1176(a)(2) of the Social Security Act, which requires the Secretary, when imposing a civil money penalty, to apply the provisions of section 1128A of the Social Security Act ‘‘in the same manner as such provisions apply to the imposition of a civil money penalty under section 1128A.’’ In determining a penalty amount, section 1128A requires the Secretary to take into account the nature of the claims and the circumstances under which they were presented; the degree of culpability, history of prior offenses and financial condition of the person presenting the claims; and such other matters as justice may require. Section 160.408 adopted these factors and provided a more specific list of circumstances within each. Because the Enforcement Rule applies to a number of rules, which apply to an enormous number of entities and circumstances, the Secretary has the discretion to decide whether and how to consider the factors (i.e., as either aggravating or mitigating) in determining the amount of a civil money penalty. As previously indicated, section 13410(d) of the HITECH Act modified section 1176(a)(1) of the Social Security Act to require that the Department base determinations of appropriate penalty amounts on the nature and extent of the violation and the nature and extent of the harm resulting from such violation. However, the HITECH Act did not modify section 1176(a)(2),which continues to require application of the factors in section 1128A. PO 00000 Frm 00020 Fmt 4701 Sfmt 4700 The proposed rule proposed to revise the structure and list of factors at § 160.408 to make explicit the new HITECH Act requirement that the Secretary consider the nature and extent of the violation and the nature and extent of the harm resulting from the violation, in addition to those factors enumerated in section 1128A. We proposed to exclude, however, the factor at § 160.408(c) regarding the degree of culpability of the covered entity, which originated in section 1128A, because culpability is now reflected in the penalty tiers. Specifically, the Department proposed to revise § 160.408(a) to identify ‘‘the nature and extent of the violation,’’ ‘‘the nature and extent of the harm resulting from the violation,’’ and the ‘‘history of prior compliance with the administrative simplification provision, including violations by the covered entity or business associate,’’ the ‘‘financial condition of the covered entity or business associate,’’ and ‘‘such other matters as justice may require,’’ as the five general factors the Secretary will consider in determining a civil money penalty. Under each of these categories, we proposed to reorganize and list the specific factors that may be considered. In addition, in the first, second, and third factors, we proposed to add certain circumstances which may be considered in determining a penalty amount. Under the first factor, we proposed to add ‘‘the number of individuals affected’’ as relevant to the extent of a violation. Under the second factor, we proposed to add ‘‘reputational harm’’ to the specific circumstances which may be considered, to make clear that reputational harm is as cognizable a form of harm as physical or financial harm. Finally, in the third factor, the Department proposed to modify the phrase ‘‘prior violations’’ to ‘‘indications of noncompliance,’’ because use of the term ‘‘violation’’ is generally reserved for instances where the Department has made a formal finding of a violation through a notice of proposed determination. However, a covered entity’s general history of HIPAA compliance is relevant in determining the amount of a civil money penalty within the penalty range. The Department did not propose to modify the Secretary’s discretion in how to apply the factors—i.e., as either mitigating or aggravating. Overview of Public Comments We received one comment requesting that the Department limit the number of mitigating factors it will consider when determining penalty amounts and apply E:\FR\FM\25JAR2.SGM 25JAR2 sroberts on DSK5SPTVN1PROD with Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations civil money penalties in every case of noncompliance, including where resolution and compliance have been achieved by informal means. The commenter also argued that a covered entity’s or business associate’s financial condition or financial difficulties should not be considered as mitigating factors in determining the amount of civil money penalties. The commenter recommended that penalties should apply to all violators except those who despite due diligence could not discover the violation, who reported the violation immediately, and who fully corrected the problem within 30 days of discovery. We received two comments in support of considering reputational harm in the computation of civil money penalties. One commenter emphasized that reputational harm addresses harm to individuals’ dignity interest and recommended the inclusion of ‘‘other’’ harm as well. However, another covered entity expressed concern that damages for reputational harm are difficult to quantify and, therefore, claims might lead to protracted litigation and expensive settlements, ultimately increasing the costs of health care. Finally, we received one comment requesting examples of situations involving a cognizable claim of reputational harm. We also received several comments requesting that the Department continue to consider the degree of culpability when determining the amount of a civil money penalty. One commenter specifically recommended that the Department consider whether unauthorized access has occurred when determining civil money penalty amounts. We also received one comment suggesting that the Department revise proposed § 160.408(c) to recognize as a mitigating factor whether the current violation is inconsistent with an entity’s prior history of compliance. With respect to the evaluation of a covered entity’s or business associate’s history of prior compliance, we received a number of comments expressing concern that replacing ‘‘violations’’ with ‘‘indications of noncompliance’’ would create ambiguity, and would not adequately inform covered entities and business associates of the factors that the Department will consider when determining civil money penalty amounts. The commenters expressed concern that expanding the evaluation of prior compliance beyond documented, formal findings of noncompliance would permit the Department to rely on information of dubious credibility. Commenters VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 requested that, to prevent uncertainty, the Department either retain the term ‘‘violations’’ or provide a clear definition, including examples, of ‘‘indications of noncompliance.’’ Finally, we received several comments requesting additional examples and guidance on how the Department will apply the factors in assessing penalty amounts. Final Rule The final rule adopts the proposed modifications. We do not eliminate the factors concerning an entity’s financial condition, as such factors are based on the requirement in section 1128A(d) of the Social Security Act. We emphasize that the goal of enforcement is to ensure that violations do not recur without impeding access to care. Further, we note that an entity’s financial condition can affect a civil money penalty in either direction, that is, while an entity in poor financial condition may face a lesser penalty if its financial condition affected its ability to comply, an entity with greater financial resources could be subject to higher penalties for violations, in part because it had the resources to maintain compliance. When considering the nature of the violation, the Department intends to consider factors such as the time period during which the violation(s) occurred and the number of individuals affected. Such considerations reflect the nature of the violation, specifically with respect to potential violations that affect a large number of individuals, for example, where disclosure of protected health information in multiple explanation of benefits statements (EOBs) that were mailed to the wrong individuals resulted from one inadequate safeguard but affected a large number of beneficiaries. However, we do recognize that these specific circumstances might also be considered under § 160.406, with respect to counting violations. See 71 FR 8390, 8409. Whether reputational harm is implicated in a HIPAA violation will be a fact-specific inquiry. We emphasize, however, that we do not consider reputational harm to arise solely from the unlawful disclosure of protected health information relating to medical diagnoses that may be considered especially sensitive, such as sexually transmitted infections or mental health disorders. Rather, the facts of the situation will determine whether reputational harm has occurred, such as whether the unlawful disclosure resulted in adverse effects on employment, standing in the community, or personal relationships. With respect to requests to consider PO 00000 Frm 00021 Fmt 4701 Sfmt 4700 5585 ‘‘other’’ harm or whether unauthorized access has occurred, we reiterate that, in determining the nature and extent of the harm involved, we may consider all relevant factors, not just those expressly included in the text of the regulation. Regarding the shift in terminology from ‘‘history of violations’’ to ‘‘prior indications of noncompliance,’’ we note that use of the terms ‘‘violation’’ or ‘‘violate’’ generally indicates that the Department has made a formal finding of a violation through a notice of proposed determination. Because the Department has a number of enforcement tools, such as informal resolution through a corrective action plan, the number of ‘‘violations’’ incurred by a covered entity or business associate does not constitute an accurate picture of a covered entity’s or business associate’s general history of compliance with all HIPAA Rules, which is relevant in determining the amount of a civil money penalty within the penalty range. See 71 FR 8390, 8408. As such, the Department modified the provision to reflect the Department’s policy of considering the covered entity’s or business associate’s general history of compliance with the HIPAA Rules when determining a civil money penalty. With regard to the phrase ‘‘indications of noncompliance,’’ we first clarify that a mere complaint does not constitute an indication of noncompliance. Instead, prior indications of noncompliance may refer to the number of times the Department has investigated an entity in the past and discovered indications of noncompliance that the Department resolved by informal means, such as satisfactory corrective action voluntarily taken by the covered entity. Finally, we agree that an entity’s history of compliance—not only a history of noncompliance—is important, and will consider such a factor. e. Section 160.410—Affirmative Defenses Interim Final Rule and Proposed Rule As noted above, the IFR made changes to the affirmatives defenses found in the Enforcement Rule at § 160.410 to implement the modifications to section 1176(b) of the Social Security Act made by section 13410(d) of the HITECH Act. Specifically, the IFR removed the previous affirmative defense to the imposition of penalties if the covered entity did not know and with the exercise of reasonable diligence would not have known of the violation (since such violations are now punishable under the lowest tier of penalties), and by providing a prohibition on the E:\FR\FM\25JAR2.SGM 25JAR2 5586 Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations imposition of penalties for any violation that is corrected within a 30-day time period, as long as the violation was not due to willful neglect. The proposed rule included additional modifications to § 160.410 to conform to the changes made to section 1176(b) by the HITECH Act. Specifically, we proposed to implement the revision of section 1176(b)(1) of the Social Security Act by providing in § 160.410(a)(1) and (2) that the affirmative defense of criminally ‘‘punishable’’ is applicable to penalties imposed prior to February 18, 2011, and on or after February 18, 2011, the Secretary’s authority to impose a civil money penalty will only be barred to the extent a covered entity or business associate can demonstrate that a criminal penalty has been imposed. Additionally, the Department also proposed modifications to the affirmative defenses in § 160.410 for violations occurring prior to February 18, 2009, to ensure the prior definition of ‘‘reasonable cause’’ continued to apply in such circumstances and avoiding any potential issues regarding a retroactive application of the revised term. sroberts on DSK5SPTVN1PROD with Final Rule The final rule adopts the proposed modifications to § 160.410. The Department did not receive any comments in response to the NPRM’s proposed revisions to this section. Overview of Public Comments f. Section 160.412—Waiver Prior to February 18, 2009, § 160.412 stated that ‘‘[f]or violations described in § 160.410(b)(3)(i) that are not corrected within the period described in § 160.410(b)(3)(ii), the Secretary may waive the civil money penalty, in whole or in part, to the extent that payment of the penalty would be excessive relative to the violation.’’ This language implicitly recognized a covered entity’s ability to claim an affirmative defense to the imposition of a civil money penalty, under what was then § 160.410(b)(2), by establishing that it did not have knowledge of the violation, determined in accordance with the Federal common law of agency, and by exercising reasonable diligence, would not have known that the violation occurred. While section 13410(d) of the HITECH Act revised section 1176(b) of the Social Security Act to eliminate the affirmative defense for such violations, absent corrective action during a 30-day period, it did not revise the Secretary’s waiver authority. As a result, the Enforcement IFR amended § 160.412 to reflect the revisions made to § 160.410 to provide that ‘‘[r]egardless of whether VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 violations occur before, on, or after February 18, 2009, the Secretary had the authority to provide a waiver for violations due to reasonable cause and not willful neglect that are not timely corrected (pursuant to the correction period in revised § 160.410(a)(3)(ii) or (b)(2)(ii), as applicable).’’ See 74 FR 56129. The proposed rule included conforming changes to § 160.412 to align the provision with the revisions to § 160.410. See 75 FR 40881. The proposed revision would effectively provide the Secretary with the authority to waive a civil money penalty, in whole or in part, for violations described in § 160.410(b)(2) (occurring prior to February 18, 2009, and due to circumstances that would make it unreasonable for the covered entity, despite the exercise of ordinary business care and prudence, to comply with the administrative simplification provision violated) or § 160.410(c) (occurring on or after February 18, 2009, and involving an establishment to the satisfaction of the Secretary that the violation is not due to willful neglect) and that are not corrected within the period specified under such paragraphs. The Department received a few comments in response to the IFR regarding the Secretary’s authority to waive the imposition of a civil money penalty for violations occurring on or after February 18, 2009, each of which urged that the Secretary’s waiver authority be extended to apply also to penalties for violations of which a covered entity did not know, or through the exercise of reasonable diligence, would not have known, in addition to reasonable cause violations, because ‘‘did not know’’ violations are a less culpable category of violation than reasonable cause violations. Final Rule The final rule adopts the modifications to § 160.412 proposed in the NPRM, which addresses the concerns of the above commenters on the IFR. g. Section 160.418—Penalty Not Exclusive Proposed Rule We proposed to revise this section to incorporate a reference to the provision of PSQIA at 42 U.S.C. 299b–22 that provides that penalties are not to be imposed under both PSQIA and the HIPAA Privacy Rule for the same violation. PO 00000 Frm 00022 Fmt 4701 Sfmt 4700 Final Rule The Department did not receive substantive public comment on this proposal. The final rule adopts the proposed modification to § 160.418. h. Section 160.420—Notice of Proposed Determination Interim Final Rule The Enforcement IFR also amended § 160.420(a)(4) to add the requirement that, in addition to the proposed penalty amount, the Secretary identify in a notice of proposed determination the applicable violation category in § 160.404 upon which the proposed penalty amount is based. While not statutorily required, the Enforcement IFR included this amendment to provide covered entities and business associates with additional information that would increase their understanding of the violation findings in the notice of proposed determination. Overview of Public Comment The Department received three comments supporting this amendment. Final Rule The final rule retains the provision as modified in the IFR. i. Calculation of the 30-Day Cure Period for Willful Neglect Violations Interim Final Rule In its discussion of the HITECH Act’s revision of affirmative defenses, the Department noted that section 1176(b)(2)(A) of the Social Security Act still operates to exclude violations due to willful neglect from those that, if timely corrected, would be exempt from the Secretary’s imposition of a civil money penalty. However, a covered entity’s timely action to correct still would be determinative with respect to which of the two tiers of willful neglect penalty amounts would apply. To determine the appropriate penalty tier for such violations, the Department stated it would calculate the 30-day cure period in the same manner as described for determining whether an affirmative defense applied. That is, the Department would look at when a covered entity first had actual or constructive knowledge of a violation due to willful neglect, based on evidence gathered during its investigation, on a case-bycase basis. See 74 FR 56128 (October 30, 2009), 70 FR 20224, 20237–8 (April 18, 2005) and 71 FR 8390, 8410 (February 16, 2006) for prior, more detailed discussions about the Department’s determination of when knowledge exists. E:\FR\FM\25JAR2.SGM 25JAR2 Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations Because the Department recognized that the minimum penalty amount under the HITECH Act of a violation due to willful neglect that is corrected during the 30-day cure period is significantly less than that for a violation due to willful neglect that is not timely corrected (equating to a $40,000 minimum penalty amount difference), the IFR specifically requested comment on whether there are alternative approaches to calculating the beginning of the 30-day cure period for this purpose. sroberts on DSK5SPTVN1PROD with Overview of Public Comments While a few commenters expressed support for utilizing the current scheme in determining which tier should apply to a violation due to willful neglect, other commenters expressed concerns with this approach due to the uncertainty with determining exactly when the cure period begins and that a business associate’s knowledge of a violation could be imputed to the covered entity prior to the business associate notifying the covered entity, as well as concerns if the Secretary does not notify an entity of a potential violation in a timely manner. A few commenters suggested that the 30-day cure period begin once the Department notifies the covered entity of a complaint. Final Rule The final rule retains the policy that the 30-day cure period for violations due to willful neglect, like those not due to willful neglect, begins on the date that an entity first acquires actual or constructive knowledge of the violation and will be determined based on evidence gathered by the Department during its investigation, on a case-bycase basis. First, the requirement that an entity have knowledge that a ‘‘violation’’ has occurred, and not only of the facts underlying the violation, is a higher standard than that which is often required by other law. Also, as a practical matter, the date an entity has actual or constructive knowledge of a violation will vary depending on the circumstances involved, and may be the result of notice by a workforce member or business associate, a complaint received by a health care consumer, or notification by the Department that a complaint has been filed. However, other sources of information exist that could establish knowledge, including internal indications of a potential noncompliance such as unusual access or audit log activity. While we understand commenters’ concerns relating to the uncertainty VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 inherent to constructive knowledge, we believe that it provides an appropriate incentive that is consistent with the strengthened enforcement of the HIPAA Rules, as provided in the HITECH Act. Reliance on notification by a complainant or the Department would not encourage self-correction or an entity’s establishment of a compliance program that proactively prevents, detects and corrects indications of noncompliance. If the cure period were solely based on external notification, it is quite possible that entities would have little or no incentive to make corrections of noncompliance until long after an incident occurred, if ever. In response to concerns that constructive knowledge may be imputed to the principal when an agent fails to notify the responsible entity, we note that an agent must be acting within the scope of agency for a covered entity or a business associate to be liable for the agent’s acts or failures to act. An agent that fails to notify a covered entity or business associate may be acting outside its scope of authority as an agent. In such a circumstance, the agent’s knowledge is not imputed to the principal under the Federal Common Law of Agency. Finally, an entity will have the opportunity to submit evidence establishing its knowledge or lack of knowledge, during the Department’s investigation. Entities will also have a right to request a hearing to appeal a finding about knowledge in a notice of proposed determination to the extent they believe the finding is not based on a preponderance of the evidence. An administrative law judge would then review the finding and affirm or modify it. Response to Other Public Comments Comment: A few commenters suggested that 30 days may not be sufficient for a covered entity to complete corrective action, particularly with respect to large organizations with complex systems, structures and relationships. One commenter suggested there should be a process available to allow an organization to apply for a reasonable extension to complete the cure. Response: In response to commenters’ concern about the length of the 30-day cure period, we note that this time period is defined by statute at section 1176(b) of the Social Security Act, and was not modified by section 13410(d) of the HITECH Act. Thus, we believe there is no authority upon which to base a modification to the length of the cure period. Comment: One commenter requested that the Department clarify whether the PO 00000 Frm 00023 Fmt 4701 Sfmt 4700 5587 new enforcement provisions will apply to violations of all HIPAA Administrative Simplification provisions or just to the privacy and security requirements. Response: The enforcement regulations at 45 CFR Part 160, Subparts C, D, and E, relate to compliance with, and the enforcement of, all of the Administrative Simplification regulations adopted under subtitle F of Title II of HIPAA, including the Standards for Electronic Transactions and Code Sets (Transactions and Code Sets Rule(s) (referred to in both a singular and plural sense); Standards for Privacy of Individually Identifiable Health Information (HIPAA Privacy Rule); Standard Unique Employer Identifier (EIN Rule); Security Standards (HIPAA Security Rule); and Standard Unique Health Identifier for Health Care Providers (NPI Rule). In addition, the Enforcement Rule applies to the Breach Notification Rule for HIPAA covered entities and business associates. C. Subparts A and C of Part 164: General Provisions and Modifications to the Security Rule We proposed implementing modifications to the Security Rule as a result of the HITECH Act and to make certain other changes. Below we respond to comments received on the proposed changes as well as describe the final rule provisions. We also discuss the final technical and conforming changes to the general provisions in Subpart A of Part 164, which applies to the Security, Privacy, and Breach Notification Rules, and respond to comments where substantive comments were received on these changes. 1. Technical Changes to Subpart A— General Provisions a. Section 164.102—Statutory Basis This section sets out the statutory basis of Part 164. We proposed and include in this final rule a technical change to include a reference to the provisions of sections 13400 through 13424 of the HITECH Act upon which the regulatory changes discussed below are based. b. Section 164.104—Applicability This section sets out to whom Part 164 applies. We proposed to replace the existing paragraph (b) with an applicability statement for business associates, consistent with the provisions of the HITECH Act. Paragraph (b) makes clear that, where provided, the standards, requirements, and implementation specifications of the HIPAA Privacy, Security, and E:\FR\FM\25JAR2.SGM 25JAR2 5588 Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations Breach Notification Rules apply to business associates. We also proposed to remove as unnecessary the existing language in § 164.104(b) regarding the obligation of a health care clearinghouse to comply with § 164.105 relating to organizational requirements of covered entities. This final rule adopts these changes as proposed. c. Section 164.105—Organizational Requirements Section 164.105 outlines the organizational requirements and implementation specifications for health care components of covered entities and for affiliated covered entities. As § 164.105 now also applies to Subpart D of Part 164 regarding breach notification for unsecured protected health information, we proposed to remove several specific references to Subparts C and E throughout this section to make clear that the provisions of this section also apply to Subpart D of Part 164. The final rule adopts these modifications. In addition, we proposed the following modifications to this section. i. Section 164.105(a)(2)(ii)(C)–(E) sroberts on DSK5SPTVN1PROD with Proposed Rule As a covered entity’s obligation to ensure that a health care component complies with the Privacy and Security Rules is already set out at § 164.105(a)(2)(ii), we proposed to modify this section to remove as unnecessary paragraphs (C) and (D), which pertain to the obligation of a covered entity to ensure that any component that performs business associate-like activities and is included in the health care component complies with the requirements of the Privacy and Security Rules, and to re-designate paragraph (E) as (C). Additionally, we requested comment on whether we should require, rather than permit as was the case at § 164.105(a)(2)(iii)(C), a covered entity that is a hybrid entity to include a component that performs business associate-like activities within its health care component so that such components are directly subject to the Rules. Overview of Public Comments Several commenters recommended that hybrid entities should retain the flexibility to either include or exclude business associates from the healthcare component. Two of these commenters stated this option would allow the covered entity to distinguish the functions and responsibilities of the business associate as separate from the health care component, which would result in better compliance, as covered entities would evaluate each business VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 associate separately for compliance purposes. Further, commenters argued that, as the covered entity is ultimately legally liable for compliance on the part of the organization, such a modification is not necessary. Additionally, several commenters stated that requiring a hybrid entity to include business associate departments is excessive and burdensome. Some of these commenters further stated that business associate departments of a hybrid entity will likely commit limited time, personnel, and staff hours to Privacy and Security Rule compliance and suggested that the hybrid entity should implement applicable entitywide policies and procedures and separately ensure that business associate departments implement specific practices scaled to the business associate’s use or disclosure of protected health information. In contrast, several commenters supported the proposed change. Several of these commenters suggested that the modification would better facilitate compliance, because requiring the covered entity to include the business associate department in the health care component would better protect the protected health information held by the business associate and would ensure consistent standards within the health care component of the covered entity. Final Rule Many covered entities perform both covered and non-covered functions as part of their business operations. For such covered entities, the entire entity is generally required to comply with the Privacy Rule. However, the hybrid entity provisions of the HIPAA Rules permit the entity to limit the application of the Rules to the entity’s components that perform functions that would make the component a ‘‘covered entity’’ if the component were a separate legal entity. Specifically, this provision allows an entity to designate a health care component by documenting the components of its organization that perform covered entity functions. The effect of such a designation is that most of the requirements of the HIPAA Rules apply only to the designated health care component of the entity and not to the functions the entity performs that are not included in the health care component. While most of the HIPAA Rules’ requirements apply only to the health care component, the hybrid entity retains certain oversight, compliance, and enforcement obligations. We explained in the preamble to the 2002 modifications to the Privacy Rule that the Rule provides hybrid entities PO 00000 Frm 00024 Fmt 4701 Sfmt 4700 with discretion as to whether or not to include business associate divisions within the health care component. However, a disclosure of protected health information from the health care component to any other division that is not part of the health care component, including a business associate division, is treated the same as a disclosure outside the covered entity. As a result, because an entity generally cannot have a business associate agreement with itself, a disclosure from the health care component to the business associate division(s) of the entity likely would require individual authorization. See 67 FR 53182, 53205 (Aug. 14, 2002). Importantly, after this final rule, business associates, by definition, are separately and directly liable for violations of the Security Rule and for violations of the Privacy Rule for impermissible uses and disclosures pursuant to their business associate contracts. With respect to a hybrid entity, however, not including business associate functions within the health care component of a hybrid entity could avoid direct liability and compliance obligations for the business associate component. Thus, we agree with the commenters that supported requiring inclusion of business associate functions inside the health care component of a hybrid entity. As such, the final rule requires that the health care component of a hybrid entity include all business associate functions within the entity. Response to Other Public Comments Comment: One commenter requested that the Department revise the definitions of ‘‘hybrid entity’’ to permit business associates to designate a health care component. Response: A business associate performs one or more functions on behalf of a covered entity (or, in this final rule, another business associate). As a business associate is only subject to the HIPAA Rules with respect to the protected health information it maintains, uses, or discloses on behalf of a covered entity (or business associate) and not to other information it may maintain, including health information, there is no need for a business associate to designate one or more health care components. Comment: One commenter asked whether an employer that operates an on-site clinic for the treatment of employees functions as a hybrid entity. Response: An entity that maintains an on-site clinic to provide health care to one or more employees may be a HIPAA covered provider to the extent the clinic performs one or more covered E:\FR\FM\25JAR2.SGM 25JAR2 Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations transactions electronically, such as billing a health plan for the services provided. If covered, the entity need not become a hybrid entity so as to avoid applying the Privacy Rule to health information the entity holds in its role as employer, such as sick leave requests of its employees. Such information is already excluded from the definition of ‘‘protected health information’’ as employment records and thus, the Privacy Rule does not apply to this information. However, the identifiable health information the entity holds as a covered health care provider (e.g., the information the clinic holds about employees who have received treatment) is protected health information and generally may not be shared with the employer for employment purposes without the individual’s authorization. ii. Section 164.105(a)(2)(iii)(C) We proposed to modify this section to re-designate § 164.105(a)(2)(iii)(C) as (D), and to include a new paragraph (C), which makes clear that, with respect to a hybrid entity, the covered entity itself, and not merely the health care component, remains responsible for complying with §§ 164.314 and 164.504 regarding business associate arrangements and other organizational requirements. Hybrid entities may need to execute legal contracts and conduct other organizational matters at the level of the legal entity rather than at the level of the health care component. The final rule adopts this change. iii. Section 164.105(b)(1) The final rule fixes a minor typographical error in this paragraph by redesignating the second paragraph (1) as paragraph (2). iv. Section 164.105(b)(2)(ii) The final rule simplifies this paragraph by collapsing subparagraphs (A), (B), and (C) regarding the obligations of an affiliated entity to comply with the Privacy and Security Rules into one provision. sroberts on DSK5SPTVN1PROD with d. Section 164.106—Relationship to Other Parts The final rule adds a reference in this provision to business associates, consistent with their inclusion elsewhere throughout the other HIPAA Rules. VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 2. Modifications to the HIPAA Security Rule in Subpart C a. Business Associates Proposed Rule Before the HITECH Act, the Security Rule did not directly apply to business associates of covered entities. However, section 13401 of the HITECH Act provides that the Security Rule’s administrative, physical, and technical safeguards requirements in §§ 164.308, 164.310, and 164.312, as well as the Rule’s policies and procedures and documentation requirements in § 164.316, apply to business associates in the same manner as these requirements apply to covered entities, and that business associates are civilly and criminally liable for violations of these provisions. To implement section 13401 of the HITECH Act, we proposed to insert references in Subpart C to ‘‘business associate’’ following references to ‘‘covered entity,’’ as appropriate, to make clear that these provisions of the Security Rule also apply to business associates. In addition, we proposed additional changes to §§ 164.306, 164.308, 164.312, 164.314, and 164.316 of the Security Rule, as discussed below. Overview of Public Comments Some commenters argued that the time, implementation expense, transaction cost, and liability cost burdens on business associates and subcontractors to comply with the Security Rule, especially small and midsize entities, would be significant. Other commenters supported the direct application of the Security Rule to business associates and subcontractors. Final Rule We adopt the modifications to the Security Rule as proposed to implement the HITECH Act’s provisions extending direct liability for compliance with the Security Rule to business associates. In response to the concerns raised regarding the costs of compliance, we note that the Security Rule currently requires a covered entity to establish a business associate agreement that requires business associates to implement administrative, physical, and technical safeguards that reasonably and appropriately protect the confidentiality, integrity, and availability of the electronic protected health information that they create, receive, maintain, or transmit on behalf of the covered entity as required by the Security Rule; and to ensure that any agent, including a subcontractor, to whom they provide such information PO 00000 Frm 00025 Fmt 4701 Sfmt 4700 5589 agrees to implement reasonable and appropriate safeguards to protect it. See § 164.314(a). Consequently, business associates and subcontractors should already have in place security practices that either comply with the Security Rule, or that require only modest improvements to come into compliance with the Security Rule requirements. Moreover, the requirements of the Security Rule were designed to be technology neutral and scalable to all different sizes of covered entities and business associates. Covered entities and business associates have the flexibility to choose security measures appropriate for their size, resources, and the nature of the security risks they face, enabling them to reasonably implement any given Security Rule standard. In deciding which security measures to use, a covered entity or business associate should take into account its size, capabilities, the costs of the specific security measures, and the operational impact. Thus, the costs of implementing the Security Rule for large, mid-sized, or small business associates will be proportional to their size and resources. Notwithstanding the above, based on the comments, we acknowledge that some business associates, particularly the smaller or less sophisticated business associates that may have access to electronic protected health information for limited purposes, may not have engaged in the formal administrative safeguards such as having performed a risk analysis, established a risk management program, or designated a security official, and may not have written policies and procedures, conducted employee training, or documented compliance as the statute and these regulations would now require. For these business associates, we include an estimate for compliance costs below in the regulatory impact analysis. We also refer these business associates to our educational papers and other guidance on compliance with the HIPAA Security Rule found at: https://www.hhs.gov/ocr/ privacy/hipaa/administrative/ securityrule. These materials provide guidance on conducting risk analyses and implementing the other administrative safeguards required by the Security Rule, which may prove helpful to these business associates and facilitate their compliance efforts. b. Section 164.306—Security Standards: General Rules Proposed Rule Section 164.306 sets out the general rules that apply to all of the security E:\FR\FM\25JAR2.SGM 25JAR2 5590 Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations standards and implementation specifications that follow in the Security Rule. We proposed technical revisions to § 164.306(e) to more clearly indicate that covered entities and business associates must review and modify security measures as needed to ensure the continued provision of reasonable and appropriate protection of electronic protected health information, and update documentation of such security measures accordingly. Final Rule The Department did not receive substantive public comment on this proposal. The final rule adopts the modifications to § 164.306 as proposed. c. Section 164.308—Administrative Safeguards sroberts on DSK5SPTVN1PROD with Proposed Rule We proposed a technical change to § 164.308(a)(3)(ii)(C) regarding security termination procedures for workforce members, to add the words ‘‘or other arrangement with’’ after ‘‘employment of’’ in recognition of the fact that not all workforce members are employees (e.g., some may be volunteers) of a covered entity or business associate. We also proposed a number of modifications to § 164.308(b) to conform to modifications proposed in the definition of ‘‘business associate.’’ Section 164.308(b) provides that a covered entity may permit a business associate to create, receive, maintain, or transmit electronic protected health information only if the covered entity has a contract or other arrangement in place to ensure the business associate will appropriately safeguard the protected health information. Section164.308(b)(2) contains several exceptions to this general rule for certain situations that do not give rise to a business associate relationship, such as where a covered entity discloses electronic protected health information to a health care provider concerning the treatment of an individual. We proposed to remove these exceptions from this provision, since as discussed above, they would now be established as exceptions to the definition of ‘‘business associate.’’ In addition, we proposed to modify § 164.308(b)(1) and (2) to clarify that covered entities are not required to obtain satisfactory assurances in the form of a contract or other arrangement with a business associate that is a subcontractor; rather, it is the business associate that must obtain the required satisfactory assurances from the subcontractor to protect the security of electronic protected health information. VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 Finally, we proposed to remove the provision at § 164.308(b)(3), which provides that a covered entity that violates the satisfactory assurances it provided as a business associate of another covered entity will be in noncompliance with the Security Rule’s business associate provisions, as a covered entity’s actions as a business associate of another covered entity would now be directly regulated by the Security Rule’s provisions that apply to business associates. Overview of Public Comments One commenter asked for confirmation that the changes to § 164.308 would require a covered entity to enter into a business associate agreement with its own business associate and not any subcontractors of those business associates. Final Rule The final rule adopts the proposed modifications to § 164.308. Section 164.308(b) expressly provides that a covered entity is not required to enter into a business associate agreement with a business associate that is a subcontractor; rather, this is the obligation of the business associate that has engaged the subcontractor to perform a function or service that involves the use or disclosure of protected health information. d. Section 164.314—Organizational Requirements Proposed Rule While Section 13401 of the HITECH Act does not expressly include § 164.314 among the provisions for which business associates are directly liable, it states that § 164.308 of the Security Rule applies to business associates ‘‘in the same manner’’ that the provision applies to covered entities. Section 164.308(b) requires a covered entity’s business associate agreements to conform to the requirements of § 164.314. Accordingly, in order for § 164.308(b) to apply to business associates in the same manner as it applies to covered entities, we proposed to revise § 164.314 to reflect that it is also applicable to agreements between business associates and subcontractors that create, receive, maintain, or transmit electronic protected health information. We also proposed a number of modifications to streamline the requirements of § 164.314. First, since a business associate for purposes of the Security Rule is also always a business associate for purposes of the Privacy Rule, we proposed to remove contract provisions that were merely duplicative PO 00000 Frm 00026 Fmt 4701 Sfmt 4700 of parallel provisions in the Privacy Rule’s business associate contract provisions at § 164.504. We also proposed to remove the specific requirements under § 164.314(a)(2)(ii) for other arrangements, such as a memorandum of understanding when both a covered entity and business associate are governmental entities, and instead simply refer to the parallel Privacy Rule requirements at § 164.504(e)(3). Second, we proposed conforming modifications to the remaining contract requirements in § 164.314(a)(2)(i) to provide that such contracts must require a business associate to comply with the Security Rule, to ensure any subcontractors enter into a contract or other arrangement to protect the security of electronic protected health information; and with respect to the reporting of security incidents by business associates to covered entities, to report to the covered entity breaches of unsecured protected health information as required by § 164.410 of the breach notification rules. Third, we proposed to add a provision at § 164.314(a)(2)(iii) that provides that the requirements of this section for contracts or other arrangements between a covered entity and business associate would apply in the same manner to contracts or other arrangements between business associates and subcontractors required by the proposed requirements of § 164.308(b)(4). For example, under these provisions, a business associate contract between a business associate and a business associate subcontractor would need to provide that the subcontractor report any security incident of which it becomes aware, including breaches of unsecured protected health information as required by § 164.410, to the business associate. This would mean that if a breach of unsecured protected health information occurs at or by a second tier subcontractor, the subcontractor must notify the business associate subcontractor with which it contracts of the breach, which then must notify the business associate which contracts with the covered entity of the breach, which then must notify the covered entity of the breach. The covered entity then notifies the affected individuals, the Secretary, and, if applicable, the media, of the breach, unless it has delegated such responsibilities to a business associate. Finally, we proposed to remove the reference to subcontractors in § 164.314(b)(2)(iii) regarding amendment of group health plan documents as a condition of disclosure of protected health information to a plan sponsor, as unnecessary and to avoid E:\FR\FM\25JAR2.SGM 25JAR2 Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations confusion with the use of the term subcontractor when referring to subcontractors that are business associates. sroberts on DSK5SPTVN1PROD with Final Rule The Department did not receive substantive public comment on these proposed changes. The final rule adopts the modifications as proposed. Response to Other Public Comments Comment: One commenter suggested that business associate agreements should be an ‘‘addressable’’ requirement under the Security Rule. Response: The HITECH Act does not remove the requirements for business associate agreements under the HIPAA Rules. Therefore, we decline to make the execution of business associate agreements an ‘‘addressable’’ requirement under the Security Rule. Comment: One commenter recommended that the Department remove the ‘‘addressable’’ designation from the Security Rule, because such designations lead to ambiguity in the application of the Security Rule in the health care industry. Response: We decline to adopt this recommendation. The Security Rule is structured to be both scalable and flexible, so that entities of different types and sizes can implement the standards and implementation specifications in a manner that is reasonable and appropriate for their circumstances. We do not mandate the use of specific technologies, or require uniform policies and procedures for compliance, because we recognize the diversity of regulated entities and appreciate the unique characteristics of their environments. Comment: Two commenters suggested providing subcontractors with additional time to comply with the provisions of the Security Rule. Response: We decline to delay application of the requirements under the Security Rule to subcontractors beyond the compliance dates provided by this final rule. As we emphasized above, the Security Rule already requires covered entities to establish business associate agreements that require business associates to ensure that their subcontractors implement reasonable and appropriate safeguards to protect the security of electronic protected health information they handle. Comment: A few commenters proposed alternative ways to apply security requirements to subcontractors, such as exempting subcontractors from compliance with the Security Rule if they have already completed security VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 assessments and met the security requirements under other State and Federal laws or only requiring subcontractors to comply with the minimum necessary standard and to utilize ‘‘reasonable’’ security measures with regard to protected health information. Response: We decline to adopt an exemption or otherwise limit subcontractors’ responsibility to safeguard individuals’ electronic protected health information. To ensure appropriate and strong security protections for electronic protected health information, subcontractors are required to comply with the Security Rule to the same extent as business associates with a direct relationship with a covered entity. D. Subpart E of Part 164: Modifications to the Privacy Rule The NPRM proposed a number of changes to the Privacy Rule to implement certain provisions of the HITECH Act, as well as certain modifications to improve the workability and effectiveness of the Rule and to conform the Privacy Rule to PSQIA. The section-by-section description below of the final rule discusses the proposed and final changes and responds to public comments 1. Section 164.500—Applicability Section 13404 of the HITECH Act makes specific requirements of the Privacy Rule applicable to business associates and creates direct liability for noncompliance by business associates with regard to those requirements. Proposed Rule In accordance with section 13404 of the HITECH Act, we proposed language in § 164.500 to clarify that, where provided, the standards, requirements, and implementation specifications of the Privacy Rule apply to business associates. Overview of Public Comments One commenter suggested that the Department expand the applicability of the Privacy Rule to all entities that handle individually identifiable health information. Some commenters requested clarification as to which provisions of the Privacy Rule apply directly to business associates, and one commenter recommended applying all of the provisions of the Privacy Rule to business associates, including requiring business associates to implement reasonable safeguards, train employees, and designate a privacy official. PO 00000 Frm 00027 Fmt 4701 Sfmt 4700 5591 Final Rule The final rule implements the proposed revisions to § 164.500. While we understand commenters’ concerns regarding the uses and disclosures of health information by entities not covered by the Privacy Rule, the Department is limited to applying the HIPAA Rules to those entities covered by HIPAA (i.e., health plans, health care clearinghouses, and health care providers that conduct covered transactions) and to business associates, as provided under the HITECH Act. As we discuss further below, section 13404 of the HITECH Act creates direct liability for impermissible uses and disclosures of protected health information by a business associate of a covered entity ‘‘that obtains or creates’’ protected health information ‘‘pursuant to a written contract or other arrangement described in § 164.502(e)(2)’’ and for compliance with the other privacy provisions in the HITECH Act. Section 13404 does not create direct liability for business associates with regard to compliance with all requirements under the Privacy Rule (i.e., does not treat them as covered entities). Therefore, under the final rule, a business associate is directly liable under the Privacy Rule for uses and disclosures of protected health information that are not in accord with its business associate agreement or the Privacy Rule. In addition, a business associate is directly liable for failing to disclose protected health information when required by the Secretary to do so for the Secretary to investigate and determine the business associate’s compliance with the HIPAA Rules, and for failing to disclose protected health information to the covered entity, individual, or individual’s designee, as necessary to satisfy a covered entity’s obligations with respect to an individual’s request for an electronic copy of protected health information. See § 164.502(a)(3) and (a)(4). Further, a business associate is directly liable for failing to make reasonable efforts to limit protected health information to the minimum necessary to accomplish the intended purpose of the use, disclosure, or request. See § 164.502(b). Finally, business associates are directly liable for failing to enter into business associate agreements with subcontractors that create or receive protected health information on their behalf. See § 164.502(e)(1)(ii). As was the case under the Privacy Rule before the HITECH Act, business associates remain contractually liable for all other Privacy Rule obligations that are included in E:\FR\FM\25JAR2.SGM 25JAR2 5592 Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations their contracts or other arrangements with covered entities. 2. Section 164.501—Definitions a. Definition of ‘‘Health Care Operations’’ Proposed Rule PSQIA provides, among other things, that Patient Safety Organizations (PSOs) are to be treated as business associates of covered health care providers. Further, PSQIA provides that the patient safety activities of PSOs are deemed to be health care operations of covered health care providers under the Privacy Rule. See 42 U.S.C. 299b–22(i). To conform to these statutory provisions, we proposed to amend paragraph (1) of the definition of ‘‘health care operations’’ to include an express reference to patient safety activities, as defined in the PSQIA implementing regulation at 42 CFR 3.20. Many health care providers participating in the voluntary patient safety program authorized by PSQIA are HIPAA covered entities. PSQIA acknowledges that such providers must also comply with the Privacy Rule and deems patient safety activities to be health care operations under the Privacy Rule. While such types of activities are already encompassed within paragraph (1) of the definition, which addresses various quality activities, we proposed to expressly include patient safety activities within paragraph (1) of the definition of health care operations to conform the definition to PSQIA and to eliminate the potential for confusion. This modification also addresses public comments the Department received during the rulemaking period for the PSQIA implementing regulations, which urged the Department to modify the definition of ‘‘health care operations’’ in the Privacy Rule to expressly reference patient safety activities so that the intersection of the Privacy and PSQIA Rules would be clear. See 73 FR 70732, 70780 (Nov. 21, 2008). Overview of Public Comments The Department received comments supporting the inclusion of patient safety activities in the definition of ‘‘health care operations.’’ Final Rule The final rule adopts the proposed modification. sroberts on DSK5SPTVN1PROD with b. Definition of ‘‘Marketing’’ Proposed Rule The Privacy Rule requires covered entities to obtain a valid authorization from individuals before using or disclosing protected health information VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 to market a product or service to them. See § 164.508(a)(3). Section 164.501 defines ‘‘marketing’’ as making a communication about a product or service that encourages recipients of the communication to purchase or use the product or service. Paragraph (1) of the definition includes a number of exceptions to marketing for certain health-related communications: (1) Communications made to describe a health-related product or service (or payment for such product or service) that is provided by, or included in a plan of benefits of, the covered entity making the communications, including communications about: The entities participating in a healthcare provider network or health plan network; replacement of, or enhancements to, a health plan; and health-related products or services available only to a health plan enrollee that add value to, but are not part of, a plan of benefits; (2) communications made for the treatment of the individual; and (3) communications for case management or care coordination for the individual, or to direct or recommend alternative treatments, therapies, health care providers, or settings of care to the individual. A covered entity is permitted to make these excepted communications without an individual’s authorization as either treatment or health care operations communications, as appropriate, under the Privacy Rule. In addition, the Privacy Rule does not require a covered entity to obtain individual authorization for face-to-face communications or to provide only promotional gifts of nominal value to the individual. See § 164.508(a)(3)(i). However, a covered entity must obtain prior written authorization from an individual to send communications to the individual about non-health related products or services or to give or sell the individual’s protected health information to a third party for marketing. Still, concerns have remained about the ability under these provisions for a third party to pay a covered entity to send health-related communications to an individual about the third party’s products or services. Section 13406(a) of the HITECH Act limits the health-related communications that may be considered health care operations and thus, that are excepted from the definition of ‘‘marketing’’ under the Privacy Rule, to the extent a covered entity receives or has received direct or indirect payment in exchange for making the communication. In cases where the covered entity would receive such PO 00000 Frm 00028 Fmt 4701 Sfmt 4700 payment, the HITECH Act at section 13406(a)(2)(B) and (C) requires that the covered entity obtain the individual’s valid authorization prior to making the communication, or, if applicable, prior to its business associate making the communication on its behalf in accordance with its written contract. Section 13406(a)(2)(A) of the HITECH Act includes an exception to the payment limitation for communications that describe only a drug or biologic that is currently being prescribed to the individual as long as any payment received by the covered entity in exchange for making the communication is reasonable in amount. Section 13406(a)(3) of the Act provides that the term ‘‘reasonable in amount’’ shall have the meaning given to such term by the Secretary in regulation. Finally, section 13406(a)(4) of the Act clarifies that the term ‘‘direct or indirect payment’’ does not include any payment for treatment of the individual. We believe Congress intended that these provisions curtail a covered entity’s ability to use the exceptions to the definition of ‘‘marketing’’ in the Privacy Rule to send communications to the individual that are motivated more by commercial gain or other commercial purpose rather than for the purpose of the individual’s health care, despite the communication being about a health-related product or service. To implement the marketing limitations of the HITECH Act, we proposed a number of modifications to the definition of ‘‘marketing’’ at § 164.501. In paragraph (1) of the definition of ‘‘marketing,’’ we proposed to maintain the general concept that ‘‘marketing’’ means ‘‘to make a communication about a product or service that encourages recipients of the communication to purchase or use the product or service.’’ In paragraph (2) of the definition, we proposed to include three exceptions to this definition to encompass certain treatment and health care operations communications about health-related products or services. First, we proposed to exclude from the definition of ‘‘marketing’’ certain health care operations communications, except where, as provided by the HITECH Act, the covered entity receives financial remuneration in exchange for making the communication. This would encompass communications to describe a health-related product or service (or payment for such product or service) that is provided by, or included in a plan of benefits of, the covered entity making the communication, as well as communications for case management E:\FR\FM\25JAR2.SGM 25JAR2 sroberts on DSK5SPTVN1PROD with Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations or care coordination, contacting of individuals with information about treatment alternatives, and related functions (to the extent these activities did not constitute ‘‘treatment’’). Although the HITECH Act uses the term ‘‘direct or indirect payment’’ to describe the limitation on permissible health care operations disclosures, the proposed rule substituted the term ‘‘financial remuneration’’ to avoid confusion with the term ‘‘payment,’’ which is defined in the Privacy Rule to mean payment for health care, and for consistency with the Privacy Rule’s current authorization requirement for marketing at § 164.508(a)(3), which uses the term ‘‘remuneration.’’ We proposed to define ‘‘financial remuneration’’ in paragraph (3) of the definition of ‘‘marketing’’ to mean direct or indirect payment from or on behalf of a third party whose product or service is being described. We also proposed to make clear, in accordance with section 13406(a)(4) of the HITECH Act, that financial remuneration does not include any direct or indirect payment for the treatment of an individual. Additionally, because the HITECH Act refers expressly to ‘‘payment,’’ rather than remuneration more generally, the proposed rule specified that only the receipt of financial remuneration in exchange for making a communication, as opposed to in-kind or any other type of remuneration, is relevant for purposes of the definition of marketing. We also proposed a conforming change to the required authorization provisions for marketing communications at § 164.508(a)(3) to add the term ‘‘financial’’ before ‘‘remuneration’’ and to refer to the new definition of ‘‘financial remuneration.’’ The proposed rule emphasized that financial remuneration for purposes of the definition of ‘‘marketing’’ must be in exchange for making the communication itself and be from or on behalf of the entity whose product or service is being described. Thus, under these proposed provisions, an authorization would be required prior to a covered entity making a communication to its patients regarding the acquisition of, for example, new state of the art medical equipment if the equipment manufacturer paid the covered entity to send the communication to its patients; but not if a local charitable organization, such as a breast cancer foundation, funded the covered entity’s mailing to patients about new state of the art mammography screening equipment. Furthermore, it would not constitute marketing and no authorization would be required if a hospital sent flyers to its VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 patients announcing the opening of a new wing where the funds for the new wing were donated by a third party, since the financial remuneration to the hospital from the third party was not in exchange for the mailing of the flyers. Second, we proposed to include the statutory exception to marketing at section 13406(a)(2)(A) for communications regarding refill reminders or otherwise about a drug or biologic that is currently being prescribed for the individual, provided any financial remuneration received by the covered entity for making the communication is reasonably related to the covered entity’s cost of making the communication. The Act expressly identifies these types of communications as being exempt from the remuneration limitation only to the extent that any payment received for making the communication is reasonable in amount. We requested comment on the scope of this exception, that is, whether communications about drugs that are related to the drug currently being prescribed, such as communications regarding generic alternatives or new formulations of the drug, should fall within the exception. We also requested comment on the types and amount of costs that should be allowed under this provision. We noted that we had considered proposing a requirement that a covered entity could only receive financial remuneration for making such a communication to the extent it did not exceed the actual cost to make the communication. However, because we were concerned that such a requirement would impose the additional burden of calculating the costs of making each communication, we proposed to allow costs that are reasonably related to a covered entity’s cost of making the communication. Third, we proposed to exclude from marketing treatment communications about health-related products or services by a health care provider to an individual, including communications for case management or care coordination for the individual, or to direct or recommend alternative treatments, therapies, health care providers, or settings of care to the individual, provided, however, that if the communications are in writing and financial remuneration is received in exchange for making the communications, certain notice and opt out conditions are met. While section 13406(a) of the HITECH Act expressly provides that a communication to an individual about a health-related product or service where the covered entity receives payment from a third PO 00000 Frm 00029 Fmt 4701 Sfmt 4700 5593 party in exchange for making the communication shall not be considered a health care operation (emphasis added) under the Privacy Rule, and thus is marketing, it is unclear how Congress intended these provisions to apply to treatment communications between a health care provider and a patient. Specifically, it is unclear whether Congress intended to restrict only those subsidized communications about products and services that are less essential to an individual’s health care (i.e., those classified as health care operations communications) or all subsidized communications about products and services, including treatment communications. Given this ambiguity and to avoid undue interference with treatment communications between the individual and a health care provider, we proposed to continue to allow subsidized treatment communications, but conditioned on providing the individual with notice and an opportunity to opt out of receiving such communications. Specifically, to ensure the individual is aware that he or she may receive subsidized treatment communications from his or her provider and has the opportunity to elect not to receive them, the proposed rule would have required at § 164.514(f)(2) that: (1) The covered health care provider’s notice of privacy practices include a statement informing individuals that the provider may send treatment communications to the individual concerning treatment alternatives or other health-related products or services where the provider receives financial remuneration from a third party in exchange for making the communication, and the individual has a right to opt out of receiving such communications; and (2) the treatment communication itself disclose the fact of remuneration and provide the individual with a clear and conspicuous opportunity to elect not to receive any further such communications. We requested comment on how the opt out should apply to future subsidized treatment communications (i.e., should the opt out prevent all future subsidized treatment communications by the provider or just those dealing with the particular product or service described in the current communication?). We also requested comment on the workability of requiring health care providers that intend to send subsidized treatment communications to individuals to provide an individual with the opportunity to opt out of receiving such communications prior to the individual receiving the first communication and what mechanisms E:\FR\FM\25JAR2.SGM 25JAR2 5594 Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations sroberts on DSK5SPTVN1PROD with could be put into place to implement such a requirement. Given that the new marketing limitations on the receipt of remuneration by a covered entity would apply differently depending on whether a communication is for treatment or health care operations purposes, and that distinguishing such communications may in many cases call for close judgments, we requested comment on the alternatives of excluding treatment communications altogether even if they involve financial remuneration from a third party or requiring individual authorization for both treatment and health care operations communications made in exchange for financial remuneration. Finally, we proposed to remove the language defining as marketing an arrangement between a covered entity and any other entity in which the covered entity discloses protected health information to the other entity, in exchange for remuneration, for the other entity or its affiliate to make a communication about its own product or service that encourages recipients of the communication to purchase or use that product or service, since such activity would now constitute a prohibited ‘‘sale’’ of protected health information under section 13405(d) of the HITECH Act and the proposed rule. Overview of Public Comments Several commenters asked as a general matter that the final rule retain the current definition of ‘‘marketing’’ and that no changes to this provision be implemented. With respect to subsidized treatment communications, many commenters expressed support for the decision in the NPRM to not require authorizations for such communications, and several argued for removing even the opt out requirement. Other commenters believed that all communications in which the covered entity receives financial remuneration for making the communication, regardless of whether the communication is for treatment purposes, should be considered marketing and require authorization. While many commenters were generally in support of not requiring authorization for treatment communications, at the same time, several commenters expressed concern with the difficulty of distinguishing between treatment communications and communications for health care operations purposes. These commenters stated that additional clarification regarding this distinction would be needed to be able to implement the NPRM’s marketing provisions. Several VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 commenters stated that while the distinction may be clear in some limited circumstances, there are other circumstances where it may be difficult for covered entities to determine what type of communication they are sending and whether authorization or just disclosure in the notice of privacy practices and the opportunity to opt out would be required. For example, while the NPRM stated that whether a communication is being made for treatment purposes or for health care operations purposes would depend on the extent to which the covered entity is making the communication in a population-based fashion (health care operations) or to further the treatment of a particular individual’s health care status or condition (treatment), many commenters stated that there may be circumstances in which a covered entity provides a population-based communication to further the treatment of the health care status or condition of an entire group of individuals. Other commenters suggested that the distinction between communications for treatment and those for health care operations purposes should be made based on the entity providing the communication: If a health care provider is providing the communication, it should be deemed for treatment purposes; however, if the communication is made by a covered entity other than a health care provider, the determination should be based on whether the communication is individual (treatment) or population based (health care operations). With respect to the subsidized treatment communications, commenters opposed to the opt out notification generally took one of three positions: All such communications should require authorizations to best protect patient privacy; an opt in method would better permit individuals to make more informed choices about whether to receive such communications; or a covered entity should be permitted to make these communications without an opportunity to opt out, because of unintended effects that may adversely affect the quality of care provided. Some commenters asked, if the opt out requirement is retained, that OCR ensure that covered entities are given significant flexibility in determining how best to implement the opt out requirement. Additionally, the vast majority of commenters did not believe there should be an opportunity to opt out of receiving subsidized treatment communications prior to receipt of the first such communication. The commenters believed that requiring an PO 00000 Frm 00030 Fmt 4701 Sfmt 4700 opportunity to opt out prior to the first communication would be too costly and burdensome for most covered entities. Many also noted that the statement in the notice of privacy practices, which would inform individuals of their option to opt out of receiving subsidized treatment communications, could serve as an opportunity to opt out before the first communication. Some commenters expressed concern even with including a statement in the notice of privacy practices because of the cost associated with modifying notices to do so. With respect to the scope of the proposed opt out, most commenters believed that the opt out should apply only to subsidized treatment communications related to a specific product or service and should not apply universally to all similar future communications from the covered entity. These commenters stated that it would be difficult for an individual to elect, in a meaningful way, not to receive all future subsidized treatment communications because he or she would not know exactly what he or she is opting out of without receiving at least one communication. Other commenters believed that while a product or service-specific application of the opt out would be ideal, it is simply unrealistic and infeasible for covered entities to be able to implement such a policy. These commenters stated that a universal opt out, which would apply to all future subsidized treatment communications, would be much simpler and easier for covered entities to implement. Additionally, while some commenters believed that individuals should be able to decide whether they want to opt out of specific subsidized treatment communications or all future such communications, most commenters supported giving covered entities the flexibility to determine the scope of this opt out provision based on their own specific capabilities. Many of these commenters also suggested that the final rule permit individuals who have opted out of receiving such communications to opt back in to receive future notices using the same methods through which the individuals had opted out. The Department also received several comments on the definition of ‘‘financial remuneration.’’ Several commenters supported the NPRM’s definition of ‘‘financial remuneration’’; however, many commenters asked for clarification regarding the scope of the definition and the meaning of the phrase ‘‘direct or indirect payment.’’ For example, some commenters asked for confirmation that non-financial benefits did not constitute financial E:\FR\FM\25JAR2.SGM 25JAR2 sroberts on DSK5SPTVN1PROD with Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations remuneration, while other commenters wanted the exception for refill reminders (that is, the communication is not marketing as long as the financial remuneration does not exceed the related costs of the communication) to apply more broadly to all marketing communications. Additionally, some commenters suggested that the final rule clarify that only financial remuneration in exchange for sending a communication triggers either the authorization or the statement of notice and opt out requirement and not the exchange of financial remuneration for the development or funding for programs, which may include the sending of a communication. These commenters generally suggested that the final rule give covered entities the flexibility to determine whether the financial remuneration received is truly in exchange for making the communication. We received a great deal of public comment on the exception to the definition of ‘‘marketing’’ for providing refill reminders or to otherwise communicate about a drug or biologic currently being prescribed for the individual where the only financial remuneration received by the covered entity in exchange for making the communication is reasonably related to the covered entity’s cost of making the communication. In general, most commenters supported this exception; however, a few commenters disagreed with the exception and felt that refill reminders should be treated as treatment communications requiring a statement in the notice and an opportunity to opt out if the communication is subsidized. Many commenters expressed the need for guidance on the scope of this exception and stated that certain communications should fall into the exception, such as communications about generic alternatives and drug adherence, and communications related to every component of a drug or biologic delivery system (especially where patients must self-administer medication). Some commenters specifically asked that the final rule exclude certain types of communications from this exception. With respect to the proposed cost limitation on the refill reminder exception, while some commenters suggested that the cost be limited to either the actual cost or the fair market value of providing the communication, generally, most commenters supported the position that reasonably related costs should not be limited to actual costs. Many of the commenters in support of a broad interpretation of VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 costs ‘‘reasonably related’’ to providing the communication suggested specific costs that should be permitted under this exception, such as costs of personnel, data storage, data processing, data analysis, data security, software, hardware, employee training, message content development, clinical review, postage, materials, drug adherence program development, formulary development, and the creation and implementation of analytics to measure the effectiveness of the communication. Several commenters noted that it would be unrealistic to expect a covered entity to perform such non-essential functions as sending refill reminders and other related communications if they could not recoup both their direct and indirect costs as well as a modest profit. Final Rule The final rule significantly modifies the proposed rule’s approach to marketing by requiring authorization for all treatment and health care operations communications where the covered entity receives financial remuneration for making the communications from a third party whose product or service is being marketed. Many of the comments we received in response to the proposed marketing provisions concerned the distinction between communications for treatment and those for health care operations purposes and sought clarification on the line between such communications. We acknowledge that the distinction between what constitutes a treatment versus a health care operations communication may be difficult to make with precision in all cases, placing covered entities at risk for violating the authorization requirement for marketing communications. We, therefore, believe that requiring authorizations for all subsidized communications that market a health related product or service is the best policy. Such a policy will ensure that all such communications are treated as marketing communications, instead of requiring covered entities to have two processes in place based on whether the communication provided to individuals is for a treatment or a health care operations purpose. We decline to retain the Privacy Rule’s definition of what constitutes ‘‘marketing’’ unchanged, as suggested by some commenters, as doing so would be inconsistent with the provisions of the Section 13406(a) of the HITECH Act. Because the final rule treats subsidized treatment communications as marketing communications that require authorization, we have not adopted the notice requirement at proposed § 164.520(b)(1)(iii)(A) that a PO 00000 Frm 00031 Fmt 4701 Sfmt 4700 5595 covered entity’s notice of privacy practices include a statement informing individuals that the provider may send treatment communications to the individual concerning treatment alternatives or other health-related products or services where the provider receives financial remuneration from a third party in exchange for making the communication, and the individual has a right to opt out of receiving such communications. We also do not retain the notice requirement that existed at § 164.520(b)(1)(iii) prior to this final rule that a covered entity include in its notice of privacy practices a statement that the covered entity may contact the individual to provide appointment reminders or information about treatment alternatives or other healthrelated benefits and services that may be of interest to the individual. Where the sending of such communications involves financial remuneration, the individual will be notified of such communications through the authorization process. Other communications for such purposes that do not involve financial remuneration are adequately captured in a covered entity’s description in its notice of privacy practices of treatment and health care operations. However, covered entities that wish to continue to include such a specific statement in their notices of privacy practices may do so. For further discussion about the Notice of Privacy Practices, please see the discussion addressing the provisions at § 164.520 below. We adopt the term ‘‘financial remuneration’’ and its definition as proposed without modification in the final rule. Most commenters were generally satisfied with the proposed use of the term and its definition. There was, however, some confusion among commenters as to what constitutes direct or indirect payment from or on behalf of a third party. We clarify that under this provision direct payment means financial remuneration that flows from the third party whose product or service is being described directly to the covered entity. In contrast, indirect payment means financial remuneration that flows from an entity on behalf of the third party whose product or service is being described to a covered entity. We also clarify that where a business associate (including a subcontractor), as opposed to the covered entity itself, receives financial remuneration from a third party in exchange for making a communication about a product or service, such communication also requires prior authorization from the individual. The HITECH Act at Section 13406(a)(2)(C) provides that a business E:\FR\FM\25JAR2.SGM 25JAR2 sroberts on DSK5SPTVN1PROD with 5596 Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations associate may make such communications on behalf of a covered entity if consistent with the written contract required by the Privacy Rule between the business associate and covered entity. The Privacy Rule a § 164.504(e)(2)(i) provides that the contract may not authorize the business associate to further use or disclose the protected health information in a manner that would violate the Rule if done by the covered entity (except in two limited circumstances not relevant here). Thus, individual authorization also must be obtained if a business associate is to send these communications instead of the covered entity. We also confirm, in response to comments, that the term ‘‘financial remuneration’’ does not include nonfinancial benefits, such as in-kind benefits, provided to a covered entity in exchange for making a communication about a product or service. Rather, financial remuneration includes only payments made in exchange for making such communications. In addition, we continue to emphasize that the financial remuneration a covered entity receives from a third party must be for the purpose of making a communication and such communication must encourage individuals to purchase or use the third party’s product or service. If the financial remuneration received by the covered entity is for any purpose other than for making the communication, then this marketing provision does not apply. For example, if a third party provides financial remuneration to a covered entity to implement a program, such as a disease management program, the covered entity could provide individuals with communications about the program without obtaining individual authorization as long as the communications are about the covered entity’s program itself. There, the communications would only be encouraging individuals to participate in the covered entity’s disease management program and would not be encouraging individuals to use or purchase the third party’s product or service. Under the final rule, for marketing communications that involve financial remuneration, the covered entity must obtain a valid authorization from the individual before using or disclosing protected health information for such purposes, and such authorization must disclose the fact that the covered entity is receiving financial remuneration from a third party. See § 164.508(a)(3). The scope of the authorization need not be limited only to subsidized VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 communications related to a single product or service or the products or services of one third party, but rather may apply more broadly to subsidized communications generally so long as the authorization adequately describes the intended purposes of the requested uses and disclosures (i.e., the scope of the authorization) and otherwise contains the elements and statements of a valid authorization under § 164.508. This includes making clear in the authorization that the individual may revoke the authorization at any time he or she wishes to stop receiving the marketing material. Because the final rule will treat all subsidized treatment communications as marketing communications for which an authorization is required, the final rule also removes the language at proposed § 164.514(f)(2), which proposed to require that such communications be accompanied by a statement in the notice and an opportunity for the individual to opt out of receiving such communications. We believe that the removal of the notice and opt out requirements for such communications and the addition of the requirement to obtain an authorization will provide covered entities with a more uniform system for treating all remunerated communications. Because the individual must now sign an authorization before the covered entity can make subsidized treatment communications, there is no longer any need to require each such communication to contain a clear and conspicuous opportunity for the individual to elect not to receive any more of these communications. Where the individual signs an authorization to receive such communications, the covered entity may use and disclose the individual’s protected health information for the purposes of making such communications unless or until the individual revokes the authorization pursuant to § 164.508(a)(5). If the individual does not authorize the covered entity to use and disclose the individual’s protected health information for the purposes of making subsidized treatment communications, then the covered entity is prohibited from doing so. We clarify that the final rule does nothing to modify the exceptions to the authorization requirement for marketing communications at § 164.508(a)(3)(i)(A) and (B). Therefore, no authorization is required where a covered entity receives financial remuneration from a third party to make a treatment or health care operations communication (or other marketing communication), if the communication is made face-to-face by PO 00000 Frm 00032 Fmt 4701 Sfmt 4700 a covered entity to an individual or consists of a promotional gift of nominal value provided by the covered entity. For example, a health care provider could, in a face to face conversation with the individual, recommend, verbally or by handing the individual written materials such as a pamphlet, that the individual take a specific alternative medication, even if the provider is otherwise paid by a third party to make such communications. However, communications made over the phone (as well as all communications sent through the mail or via email) do not constitute face to face communications, and as such, these communications require individual authorization where the covered entity receives remuneration in exchange for making the communications. With respect to the exception for refill reminders or to otherwise communicate about a drug or biologic currently being prescribed to the individual, we adopt the exception as proposed. We continue to provide a stand-alone exception for refill reminders, given that the HITECH Act expressly does so. We therefore decline to adopt the suggestions of commenters to consider these communications to specifically be treatment communications (which would have required, under the provisions of the proposed rule, notice and an opportunity to opt out where the covered entity receives financial remuneration), or health care operations communications (which require authorization if financial remuneration is received). Many commenters asked for guidance and clarification regarding the scope of this exception, and we received a wide array of examples of communications that commenters suggested should fall within this exception. At this time, we clarify that we consider communications about the generic equivalent of a drug being prescribed to an individual as well as adherence communications encouraging individuals to take their prescribed medication as directed fall within the scope of this exception. Additionally, we clarify that where an individual is prescribed a self-administered drug or biologic, communications regarding all aspects of a drug delivery system, including, for example, an insulin pump, fall under this exception. With respect to the array of other examples and suggestions provided by commenters as to what should fall within or outside of the exception, we intend to provide future guidance to address these questions. The proposed rule contained the Act’s limitation that the financial E:\FR\FM\25JAR2.SGM 25JAR2 sroberts on DSK5SPTVN1PROD with Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations remuneration received in exchange for providing a refill reminder or to otherwise communicate about a drug or biologic currently being prescribed to the individual must be ‘‘reasonable in amount,’’ by providing that such remuneration must be reasonably related to the covered entity’s cost of making the communication for the exception from marketing to apply. We adopt this provision in the final rule. In response to comments regarding what types of costs fall within permissible remuneration, we clarify that we consider permissible costs for which a covered entity may receive remuneration under this exception are those which cover only the costs of labor, supplies, and postage to make the communication. Where the financial remuneration a covered entity receives in exchange for making the communication generates a profit or includes payment for other costs, such financial remuneration would run afoul of the Act’s ‘‘reasonable in amount’’ language. Thus, under this final rule, if a pharmacy receives financial remuneration from a drug manufacturer to provide refill reminders to individuals taking a particular drug that covers only the pharmacy’s cost of drafting, printing, and mailing the refill reminders, the exception would apply and no authorization would be required. However, where the drug manufacturer also provides the pharmacy with a financial incentive beyond the cost of making the communication to encourage the pharmacy’s continued willingness to send such communications on behalf of the drug manufacturer, the exception would not apply and the pharmacy must obtain individual authorization. We note, however, that if a pharmacy provides refill reminders to individuals only when they visit the pharmacy (in face to face encounters), such communications would be permitted under § 164.508(a)(3)(i)(A) and thus, authorization would not be required even if the pharmacy receives financial remuneration above and beyond what is reasonably related to the pharmacy’s cost of making the communication. Finally, in addition to the communications that fall within the refill reminder exception, two other types of communications continue to be exempt from the marketing provisions. First, as explained in the NPRM, communications promoting health in general and that do not promote a product or service from a particular provider, such as communications promoting a healthy diet or encouraging individuals to get certain routine VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 diagnostic tests, such as annual mammograms, do not constitute marketing and thus, do not require individual authorization. Second, communications about government and government-sponsored programs do not fall within the definition of ‘‘marketing’’ as there is no commercial component to communications about benefits through public programs. Therefore, a covered entity may use and disclose protected health information to communicate with individuals about eligibility for programs, such as Medicare, Medicaid, or the State Children’s Health Insurance Program (CHIP) without obtaining individual authorization. Response to Other Public Comments Comment: One commenter asked whether it is marketing where an entity promotes its discounts on covered benefits or member-exclusive valueadded health products and services by paying a mailing house that is the health plan’s business associate to send its written promotional material to health plan members. The commenter stated that only the mailing house, and not the covered entity, is paid to send the communications. Response: Even where a business associate of a covered entity, such as a mailing house, rather than the covered entity itself, receives the financial remuneration from the entity whose product or service is being promoted to health plan members, the communication is a marketing communication for which prior authorization is required. As stated above, under the Privacy Rule, a business associate generally may not use or disclose protected health information in a manner that would be impermissible if done by the covered entity. We note, however, that nonfinancial or in-kind remuneration may be received by the covered entity or its business associate and it would not implicate the new marketing restrictions. Thus, if the materials describing a member-exclusive valueadded health product or service were provided by the entity to the health plan or its business associate and no payment was made by the entity relating to the mailing or distribution of the materials, the covered entity or its business associate would be able to provide the material to its members without requiring an authorization. PO 00000 Frm 00033 Fmt 4701 Sfmt 4700 5597 3. Business Associates a. Section 164.502(a) and (b)—Permitted and Required Uses and Disclosures and Minimum Necessary Before the HITECH Act, the Privacy Rule did not govern business associates directly. However, section 13404 of the HITECH Act makes specific requirements of the Privacy Rule applicable to business associates, and creates direct liability for noncompliance by business associates with regard to those Privacy Rule requirements. Specifically, section 13404(a) of the HITECH Act creates direct liability for uses and disclosures of protected health information by business associates that do not comply with its business associate contract or other arrangement under the Privacy Rule. Additionally, section 13404(a) applies the other privacy requirements of the HITECH Act directly to business associates just as they apply to covered entities. Section 13404(b) applies the provision of § 164.504(e)(1)(ii) regarding knowledge of a pattern of activity or practice that constitutes a material breach or violation of a contract to business associates. Finally, section 13404(c) applies the HIPAA civil and criminal penalties to business associates. We discuss the modifications to the Privacy Rule pursuant to paragraphs (a) and (b) of section 13404 of the HITECH Act below. We address the modifications made to the Enforcement Rule by section 13404(c) regarding the application of penalties to violations by business associates above in the discussion of the changes to the Enforcement Rule. We note that we have not added references to ‘‘business associate’’ to all provisions of the Privacy Rule that address uses and disclosures by covered entities. Such additions to the Privacy Rule are unnecessary, as a business associate generally may only use or disclose protected health information in the same manner as a covered entity. Therefore, any Privacy Rule limitation on how a covered entity may use or disclose protected health information automatically extends to a business associate. i. Permitted and Required Uses and Disclosures Proposed Rule We proposed to modify § 164.502(a) of the Privacy Rule containing the general rules for uses and disclosures of protected health information to address the permitted and required uses and disclosures of protected health information by business associates. First, we proposed to modify E:\FR\FM\25JAR2.SGM 25JAR2 sroberts on DSK5SPTVN1PROD with 5598 Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations § 164.502(a) to provide that a business associate, like a covered entity, may not use or disclose protected health information except as permitted or required by the Privacy Rule or the Enforcement Rule. Second, we proposed to add new provisions at § 164.502(a)(4) and (5) to specify the permitted and required uses and disclosures of protected health information by business associates. In accordance with section 13404(a) of the HITECH Act, we proposed in § 164.502(a)(4) to allow business associates to use or disclose protected health information only as permitted or required by their business associate contracts or other arrangements pursuant to § 164.504(e) or as required by law. Any other use or disclosure would violate the Privacy Rule. Proposed § 164.502(a)(4) also provided that a business associate would not be permitted to use or disclose protected health information in a manner that would violate the Privacy Rule if done by the covered entity, except that the business associate would be permitted to use or disclose protected health information for the proper management and administration of the business associate and to provide data aggregation services for the covered entity, as specified at § 164.504(e)(2)(i)(A) and (B), if such uses and disclosures are permitted by its business associate contract or other arrangement. In § 164.502(a)(5), we proposed to require that a business associate disclose protected health information either: (1) When required by the Secretary under Subpart C of Part 160 to investigate or determine the business associate’s compliance with this subchapter; or (2) to the covered entity, individual, or individual’s designee, as necessary to satisfy a covered entity’s obligations under § 164.524(c)(2)(ii) and (3)(ii), as modified, with respect to an individual’s request for an electronic copy of protected health information. Section 13405(e) of the HITECH Act requires covered entities that maintain protected health information in an electronic health record to provide an individual, or the individual’s designee, with a copy of such information in an electronic format, if the individual so chooses. We proposed to include a similar direct requirement on business associates in § 164.502(a)(5), as section 13404(a) of the HITECH Act also applies section 13405(e) to business associates. We also proposed a conforming change to revise the titles of § 164.502(a)(1) and (a)(2) to make clear that these provisions setting out permitted uses and disclosures of VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 protected health information apply only to covered entities, as well as a technical change to § 164.502(a)(2)(ii) to replace the term ‘‘subpart’’ with ‘‘subchapter’’ to make clear that a covered entity is required to disclose protected health information to the Secretary as needed to determine compliance with any of the HIPAA Rules and not just the Privacy Rule. Overview of Public Comments Several commenters expressed concern about the increased liability for business associates under the rule and requested clarification on when business associate liability for impermissible uses and disclosures would attach. Several commenters asked for clarification as to what a business associate is directly liable for under the Privacy Rule, and some expressed specific confusion regarding the liability of business associates for the provision of e-access under the rule. Final Rule The final rule adopts the proposed modifications to § 164.502(a). The provisions specifying a business associate’s permitted and required uses and disclosures of protected health information are renumbered from § 164.502(a)(4) and (a)(5), as proposed, to § 164.502(a)(3) and (a)(4), as § 164.502(a)(5) of the final rule now includes provisions to address prohibited uses and disclosures. Section 164.502(a)(5) is discussed below in the sections describing the prohibitions on the sale of protected health information and the use or disclosure of genetic information for underwriting purposes. In response to specific comments asking for clarification regarding when business associate liability would attach, we provide the following. As we discussed above, the final rule provides that a business associate is a person who performs functions or activities on behalf of, or certain services for, a covered entity or another business associate that involve the use or disclosure of protected health information. The final rule establishes that a person becomes a business associate by definition, not by the act of contracting with a covered entity or otherwise. Therefore, liability for impermissible uses and disclosures attaches immediately when a person creates, receives, maintains, or transmits protected health information on behalf of a covered entity or business associate and otherwise meets the definition of a business associate. Liability also does not depend on the type of protected health information that a business associate creates, PO 00000 Frm 00034 Fmt 4701 Sfmt 4700 receives, maintains, or transmits on behalf of a covered entity or another business associate, or on the type of entity performing the function or service, except to the extent the entity falls within one of the exceptions at paragraph 4 of the definition of business associate. First, protected health information created, received, maintained, or transmitted by a business associate may not necessarily include diagnosis-specific information, such as information about the treatment of an individual, and may be limited to demographic or other information not indicative of the type of health care services provided to an individual. If the information is tied to a covered entity, then it is protected health information by definition since it is indicative that the individual received health care services or benefits from the covered entity, and therefore it must be protected by the business associate in accordance with the HIPAA Rules and its business associate agreement. Second, the definition of business associate is contingent on the fact that the business associate performs certain activities or functions on behalf of, or provides certain services to, a covered entity or another business associate that involve the use or disclosure of protected health information. Therefore, any person, defined in the HIPAA Rules as a natural person, trust or estate, partnership, corporation, professional association or corporation, or other entity, public or private, who performs these functions or activities or services is a business associate for purposes of the HIPAA Rules, regardless of whether such person has other professional or privilege-based duties or responsibilities. Finally, while we understand commenters’ concerns about the increased liability for business associates under the HIPAA Rules, such direct liability for violations of certain HIPAA provisions is expressly provided for by the HITECH Act. In response to comments requesting clarification on with which HIPAA provisions a business associate is directly liable for compliance, we provide the following. Business associates are directly liable under the HIPAA Rules for impermissible uses and disclosures,4 for a failure to provide breach notification to the covered entity,5 for a failure to provide access to a copy of electronic protected health information to either the covered entity, the individual, or the individual’s designee (whichever is specified in the 4 See 5 See E:\FR\FM\25JAR2.SGM § 164.502(a)(3). § 164.410. 25JAR2 Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations business associate agreement),6 for a failure to disclose protected health information where required by the Secretary to investigate or determine the business associate’s compliance with the HIPAA Rules,7 for a failure to provide an accounting of disclosures,8 and for a failure to comply with the requirements of the Security Rule.9 Business associates remain contractually liable for other requirements of the business associate agreement (see below for a discussion of the business associate agreement provisions). With respect to a business associate’s direct liability for a failure to provide access to a copy of electronic protected health information, business associates are liable for providing electronic access in accordance with their business associate agreements. Therefore, business associates may provide electronic access directly to individuals or their designees, or may provide the electronic protected health information to the covered entity (which then provides the electronic access to individuals or their designees). As with many other provisions in the HIPAA Rules, the Department leaves the details to the contracting parties, and is concerned only that access is provided to the individual, not with which party provides the access. ii. Minimum Necessary sroberts on DSK5SPTVN1PROD with Proposed Rule We proposed to modify the minimum necessary standard at § 164.502(b) to require that when business associates use, disclose, or request protected health information from another covered entity, they limit protected health information to the minimum necessary to accomplish the intended purpose of the use, disclosure, or request. Applying the minimum necessary standard is a condition of the permissibility of many uses and disclosures of protected health information. Thus, a business associate is not making a permitted use or disclosure under the Privacy Rule if it does not apply the minimum necessary standard, where appropriate. Additionally, the HITECH Act at section 13405(b) addresses the application of minimum necessary and, in accordance with 13404(a), also applies such requirements to business associates. 6 See § 164.502(a)(4)(ii). § 164.502(a)(4)(i). 8 See 76 FR 31426 (May 31, 2011). 9 See Subpart C of Part 164. 7 See VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 Overview of Public Comments While the Department received general support for application of the minimum necessary standard to requests and uses and disclosures by business associates, several commenters requested clarification on such application. Final Rule The final rule adopts the proposal to apply the minimum necessary standard directly to business associates when using or disclosing protected health information or when requesting protected health information from another covered entity. The final rule also makes clear that requests directed to another business associate, in addition to those directed to another covered entity, must also be limited to the minimum necessary. Covered entities and business associates disclosing protected health information in response may reasonably rely on such requests as requesting the minimum necessary for the disclosure. How a business associate will apply the minimum necessary standard will vary based on the circumstances. As is the case today, a business associate agreement must limit the business associate’s uses and disclosures of protected health information to be consistent with the covered entity’s minimum necessary policies and procedures. We leave it to the discretion of the parties to determine to what extent the business associate agreement will include specific minimum necessary provisions to ensure a business associate’s uses and disclosures and requests for protected health information are consistent with the covered entity’s minimum necessary policies and procedures. The Department intends to issue future guidance on the minimum necessary standard in accordance with section 13405(b) of the HITECH Act that will consider the specific questions posed by commenters with respect to business associates’ application of the minimum necessary standard. b. Sections 164.502(e) and 164.504(e)— Business Associate Agreements Proposed Rule Section 164.502(e) permits a covered entity to disclose protected health information to a business associate and may allow a business associate to create or receive protected health information on its behalf, if the covered entity obtains satisfactory assurances, in the form of a written contract or other written arrangement with the business associate that meets the requirements of PO 00000 Frm 00035 Fmt 4701 Sfmt 4700 5599 § 164.504(e), that the business associate will appropriately safeguard the information. We proposed a parallel provision in § 164.502(e) that would allow a business associate to disclose protected health information to a business associate that is a subcontractor, and to allow the subcontractor to create or receive protected health information on its behalf, if the business associate obtains similar satisfactory assurances that the subcontractor will appropriately safeguard the information. Consistent with the proposal with respect to Security Rule requirements and business associates, we proposed to make clear in § 164.502(e) that a covered entity would not be required to obtain satisfactory assurances from business associates that are subcontractors. Rather, a business associate would be required to obtain such assurances from a subcontractor. Thus, the proposed provisions would not change the parties to the contracts. For example, a covered entity may choose to contract with a business associate (contractor) to use or disclose protected health information on its behalf, the business associate may choose to obtain the services of (and exchange protected health information with) a subcontractor (subcontractor 1), and that subcontractor may, in turn, contract with another subcontractor (subcontractor 2) for services involving protected health information. The contractor and subcontractors 1 and 2 would now be business associates with direct liability under the HIPAA Rules, and would be required to obtain business associate agreements with the parties with whom they contract for services that involve access to protected health information. (Note, however, as discussed above with respect to the definition of ‘‘business associate,’’ direct liability under the HIPAA Rules would attach regardless of whether the contractor and subcontractors have entered into the required business associate agreements.) We also proposed to remove § 164.502(e)(1)(iii), which provides that a covered entity that violates the satisfactory assurances it provided as a business associate of another covered entity will be in noncompliance with the Privacy Rule’s business associate agreement provisions, given that proposed changes to § 164.502 would now restrict directly the uses and disclosures of protected health information by a business associate, including a covered entity acting as a business associate, to those uses and disclosures permitted by its business associate agreement. E:\FR\FM\25JAR2.SGM 25JAR2 sroberts on DSK5SPTVN1PROD with 5600 Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations Finally, as discussed above with respect to the definition of business associate, we proposed to move the current exceptions to business associate to the definition itself in § 160.103. Section 164.504(e) contains the specific requirements for business associate contracts and other arrangements. We proposed a number of modifications to § 164.504(e) to implement section 13404 of the HITECH Act and to reflect the Department’s new regulatory authority with respect to business associates, as well as to reflect a covered entity’s and business associate’s new obligations under Subpart D of Part 164 of the Privacy Rule to provide for notification in the case of breaches of unsecured protected health information. Section 164.504(e)(1)(ii) provides that a covered entity is not in compliance with the business associate requirements if the covered entity knew of a pattern of activity or practice of the business associate that constituted a material breach or violation of the business associate’s obligation under the contract or other arrangement, unless the covered entity took reasonable steps to cure the breach or end the violation, as applicable, and if such steps were unsuccessful, terminated the contract or arrangement or, if termination is not feasible, reported the problem to the Secretary. We proposed to remove the requirement that covered entities report to the Secretary when termination of a business associate agreement is not feasible. In light of a business associate’s direct liability for civil money penalties for certain violations of the business associate agreement and both a covered entity’s and business associate’s obligations under Subpart D to report breaches of unsecured protected health information to the Secretary, we have other mechanisms through which we expect to learn of such breaches and misuses of protected health information by a business associate. We also proposed to add a new provision at § 164.504(e)(1)(iii) applicable to business associates with respect to subcontractors to mirror the requirements on covered entities at § 164.504(e)(1)(ii) (minus the requirement to report to the Secretary if termination of a contract is not feasible). Thus, a business associate that is aware of noncompliance by its business associate subcontractor would be required to respond to the situation in the same manner as a covered entity that is aware of noncompliance by its business associate. We believe this provision would implement section 13404(b) of the HITECH Act, and would align the requirements for business VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 associates with regard to business associate subcontractors with the requirements for covered entities with regard to their business associates. We also proposed changes to the specific business associate agreement provisions at § 164.504(e). First, we proposed to revise § 164.504(e)(2)(ii)(B) through (D) to provide that the contract will require that: in (B), business associates comply, where applicable, with the Security Rule with regard to electronic protected health information; in (C), business associates report breaches of unsecured protected health information to covered entities, as required by § 164.410; and in (D), in accordance with § 164.502(e)(1)(ii), business associates ensure that any subcontractors that create or receive protected health information on behalf of the business associate agree to the same restrictions and conditions that apply to the business associate with respect to such information. These revisions were proposed to align the requirements for the business associate agreement with the requirements in the HITECH Act and elsewhere within the HIPAA Rules. Additionally, we proposed to add a new agreement provision at § 164.504(e)(2)(ii)(H) (and to renumber the current paragraphs (H) and (I) accordingly) to requires that, to the extent the business associate is to carry out a covered entity’s obligation under this subpart, the business associate must comply with the requirements of the Privacy Rule that apply to the covered entity in the performance of such obligation. This provision would clarify that when a covered entity delegates a responsibility under the Privacy Rule to the business associate, the business associate would be contractually required to comply with the requirements of the Privacy Rule in the same manner as they apply to the covered entity. For example, if a third party administrator, as a business associate of a group health plan, fails to distribute the plan’s notice of privacy practices to participants on a timely basis, the third party administrator would not be directly liable under the HIPAA Rules, but would be contractually liable, for the failure. However, even though the business associate is not directly liable under the HIPAA Rules for failure to provide the notice, the covered entity remains directly liable for failure to provide the individuals with its notice of privacy practices because it is the covered entity’s ultimate responsibility to do so, despite its having hired a business associate to perform the function. PO 00000 Frm 00036 Fmt 4701 Sfmt 4700 We also proposed to add a new § 164.504(e)(5) that would apply the requirements at § 164.504(e)(2) through (e)(4) to the contract or other arrangement between a business associate and its business associate subcontractor as required by § 164.502(e)(1)(ii) in the same manner as such requirements apply to contracts or other arrangements between a covered entity and its business associate. Thus, a business associate would be required by § 164.502(e)(1)(ii) and by this section to enter into business associate agreements or other arrangements that comply with the Privacy and Security Rules with their business associate subcontractors, in the same manner that covered entities are required to enter into contracts or other arrangements with their business associates. Finally, we proposed a few other minor changes. We proposed in § 164.504(e)(3) regarding other arrangements for governmental entities to include references to the Security Rule requirements for business associates to avoid having to repeat such provisions in the Security Rule. We also proposed to remove the reference to subcontractors in § 164.504(f)(2)(ii)(B) (regarding disclosures to plan sponsors) and in § 164.514(e)(4)(ii)(C)(4) (regarding data use agreements for limited data sets) to avoid confusion since the term ‘‘subcontractor’’ is now a defined term under the HIPAA Rules with a particular meaning that is related to business associates. The proposed removal of the term was not intended as a substantive change to the provisions. Overview of Public Comments Several commenters expressed confusion regarding the need for business associate agreements, considering the provisions for direct liability from the HITECH Act and in the proposed rule. Many of these commenters suggested that all of the requirements of the Privacy Rule apply to business associates, as is the case with the Security Rule. A few commenters requested clarification about what constitutes ‘‘satisfactory assurances’’ pursuant to the rule, asking whether, for example, there were expectations on covered entities to ensure that business associates (including subcontractors) have appropriate controls in place besides business associate agreements or whether a covered entity must obtain from a business associate satisfactory assurance that any business associate subcontractors are complying with the Rules. Several commenters requested clarification on the appropriateness of E:\FR\FM\25JAR2.SGM 25JAR2 Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations sroberts on DSK5SPTVN1PROD with indemnification clauses in business associate agreements. Finally, several commenters requested that the Department provide a model business associate agreement. Final Rule The final rule adopts the proposed modifications to §§ 164.502(e) and 164.504(e). As we discussed above, while section 13404 of the HITECH Act provides that business associates are now directly liable for civil money penalties under the HIPAA Privacy Rule for impermissible uses and disclosures and for the additional HITECH requirements in Subtitle D that are made applicable to covered entities, it does not apply all of the requirements of the Privacy Rule to business associates and thus, the final rule does not. Therefore, business associates are not required to comply with other provisions of the Privacy Rule, such as providing a notice of privacy practices or designating a privacy official, unless the covered entity has chosen to delegate such a responsibility to the business associate, which would then make it a contractual requirement for which contractual liability would attach. Concerning commenters’ questions about the continued need for business associate agreements given the new direct liability on business associates for compliance, we note that section 13404 of the HITECH Act expressly refers and ties business associate liability to making uses and disclosures in accordance with the uses and disclosures laid out in such agreements, rather than liability for compliance with the Privacy Rule generally. Further, section 13408 of the HITECH Act requires certain data transmission and personal health record vendors to have in place business associate agreements with the covered entities they serve. We also continue to believe that, despite the business associate’s direct liability for certain provisions of the HIPAA Rules, the business associate agreement is necessary to clarify and limit, as appropriate, the permissible uses and disclosures by the business associate, given the relationship between the parties and the activities or services being performed by the business associate. The business associate agreement is also necessary to ensure that the business associate is contractually required to perform certain activities for which direct liability does not attach (such as amending protected health information in accordance with § 164.526). In addition, the agreement represents an opportunity for the parties to clarify their respective responsibilities under VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 the HIPAA Rules, such as by establishing how the business associate should handle a request for access to protected health information that it directly receives from an individual. Finally, the business associate agreement serves to notify the business associate of its status under the HIPAA Rules, so that it is fully aware of its obligations and potential liabilities. With respect to questions about ‘‘satisfactory assurances,’’ § 164.502(e) provides that covered entities and business associates must obtain and document the ‘‘satisfactory assurances’’ of a business associate through a written contract or other agreement, such as a memorandum of understanding, with the business associate that meets the applicable requirements of § 164.504(e). As discussed above, § 164.504(e) specifies the provisions required in the written agreement between covered entities and business associates, including a requirement that a business associate ensure that any subcontractors agree to the same restrictions and conditions that apply to the business associate by providing similar satisfactory assurances. Beyond the required elements at § 164.504(e), as with any contracting relationship, business associates and covered entities may include other provisions or requirements that dictate and describe their business relationship, and that are outside the governance of the Privacy and Security Rules. These may or may not include additional assurances of compliance or indemnification clauses or other risk-shifting provisions. We also clarify with respect to the satisfactory assurances to be provided by subcontractors, that the agreement between a business associate and a business associate that is a subcontractor may not permit the subcontractor to use or disclose protected health information in a manner that would not be permissible if done by the business associate. For example, if a business associate agreement between a covered entity and a contractor does not permit the contractor to de-identify protected health information, then the business associate agreement between the contractor and a subcontractor (and the agreement between the subcontractor and another subcontractor) cannot permit the de-identification of protected health information. Such a use may be permissible if done by the covered entity, but is not permitted by the contractor or any subcontractors if it is not permitted by the covered entity’s business associate agreement with the contractor. In short, each agreement in the business associate chain must be as PO 00000 Frm 00037 Fmt 4701 Sfmt 4700 5601 stringent or more stringent as the agreement above with respect to the permissible uses and disclosures. Finally, in response to the comments requesting a model business associate agreement, we note that the Department has published sample business associate provisions on its web site. The sample language is designed to help covered entities comply with the business associate agreement requirements of the Privacy and Security Rules. However, use of these sample provisions is not required for compliance with the Rules, and the language should be amended as appropriate to reflect actual business arrangements between the covered entity and the business associate (or a business associate and a subcontractor). Response to Other Public Comments Comment: Commenters requested guidance on whether a contract that complies with the requirements of the Graham Leach Bliley Act (GLBA) and incorporates the required elements of the HIPAA Rules may satisfy both sets of regulatory requirements. The commenters urged the Department to permit a single agreement rather than requiring business associates and business associate subcontractors to enter into separate GLBA agreements and business associate agreements. Response: While meeting the requirements of the GLBA does not satisfy the requirements of the HIPAA Rules, covered entities may use one agreement to satisfy the requirements of both the GLBA and the HIPAA Rules. Comment: A few commenters recommended adding an exception to having a business associate agreement for a person that receives a limited dataset and executes a data use agreement for research, health care operations, or public health purposes. Response: We have prior guidance that clarifies that if only a limited dataset is released to a business associate for a health care operations purpose, then a data use agreement suffices and a business associate agreement is not necessary. To make this clear in the regulation itself, we are adding to § 164.504(e)(3) a new paragraph (iv) that recognizes that a data use agreement may qualify as a business associate’s satisfactory assurance that it will appropriately safeguard the covered entity’s protected health information when the protected health information disclosed for a health care operations purpose is a limited data set. A similar provision is not necessary or appropriate for disclosures of limited data sets for research or public health purposes since such disclosures would E:\FR\FM\25JAR2.SGM 25JAR2 sroberts on DSK5SPTVN1PROD with 5602 Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations not otherwise require business associate agreements. Comment: A few commenters requested that the Department delete § 164.504(e)(2)(ii)(H), which provides that to the extent the business associate is to carry out a covered entity’s obligation under the HIPAA Rules, the business associate must comply with the requirements of the HIPAA Rules that apply to the covered entity in the performance of the obligation on behalf of the covered entity. Alternatively, commenters suggested that the Department clarify that the requirements of the section need not be included in business associate agreements and that this section does not limit the ability of covered entities and business associates to negotiate responsibilities with regard to other sections of the Privacy Rule. Response: The Department declines to delete § 164.504(e)(2)(ii)(H). If a business associate contracts to provide services to the covered entity with regard to fulfilling individual rights or other obligations of the covered entity under the Privacy Rule, then the business associate agreement must require the business associate to fulfill such obligation in accordance with the Privacy Rule’s requirements. We do clarify, however, that if the covered entity does not delegate any of its responsibilities under the Privacy Rule to the business associate, then § 164.504(e)(2)(ii)(H) is not applicable and the parties are not required to include such language. Comment: One commenter requested that the Department modify § 164.502(a)(4)(i) to permit business associates to use and disclose protected health information for their own health care operations purposes, and another commenter requested that the Department clarify whether § 164.504(e)(4) provides that a business associate may use or disclose protected health information as a covered entity would use or disclose the information. Response: The Department declines to make the suggested modification. Business associates do not have their own health care operations (see the definition of health care operations at § 164.501, which is limited to activities of the covered entity). While a business associate does not have health care operations, it is permitted by § 164.504(e)(2)(i)(A) to use and disclose protected health information as necessary for its own management and administration if the business associate agreement permits such activities, or to carry out its legal responsibilities. Other than the exceptions for the business associate’s management and VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 administration and for data aggregation services relating to the health care operations of the covered entity, the business associate may not use or disclose protected health information in a manner that would not be permissible if done by the covered entity (even if such a use or disclosure is permitted by the business associate agreement). Comment: One commenter suggested requiring subcontractors to return or destroy all protected health information received from or created for a business associate when the contract with the business associate is terminated. Response: The final rule at § 164.504(e)(5) does apply the requirements at § 164.504(e)(2) through (4) (which set forth the requirements for agreements between covered entities and their business associates) to agreements between business associates and their subcontractors. This includes § 164.504(e)(2)(ii)(J), which requires the business associate to return or destroy all protected health information received from, or created or received on behalf of, the covered entity at the termination of the contract, if feasible. When this requirement is applied to the agreement between the business associate and its business associate subcontractor, the effect is a contractual obligation for the business associate subcontractor to similarly return or destroy protected health information at the termination of the contract, if feasible. Comment: One commenter suggested requiring a business associate to disclose all subcontractors of the business associate to a covered entity within thirty days of the covered entity’s request. Response: The Department declines to adopt this suggestion as a requirement of the HIPAA Rules, because such a requirement would impose an undue disclosure burden on business associates. However, covered entities and business associates may include additional terms and conditions in their contracts beyond those required by § 164.504. Comment: One commenter suggested establishing a certification process of business associates and subcontractors with regard to HIPAA compliance. Response: The Department declines to establish or endorse a certification process for HIPAA compliance for business associates and subcontractors. Business associates and subcontractors are free to enlist the services of outside entities to assess their compliance with the HIPAA Rules and certification may be a useful compliance tool for entities, depending on the rigor of the program. However, certification does not PO 00000 Frm 00038 Fmt 4701 Sfmt 4700 guarantee compliance and therefore ‘‘certified’’ entities may still be subject to enforcement by OCR. Comment: One commenter requested clarification on when it is not feasible for a business associate to terminate a contract with a subcontractor. Response: Whether it is feasible for a business associate to terminate an agreement with a business associate subcontractor is a very fact-specific inquiry that must be examined on a case-by-case basis. For example, termination is not feasible for a business associate with regard to a subcontractor relationship where there are no other viable business alternatives for the business associate (when the subcontractor, for example, provides a unique service that is necessary for the business associate’s operations). See our prior guidance on this issue as it applies to covered entities and business associates in Frequently Asked Question #236, available at https://www.hhs.gov/ ocr/privacy/hipaa/faq/ business_associates/236.html. c. Section 164.532—Transition Provisions Proposed Rule We understand that covered entities and business associates are concerned with the anticipated administrative burden and cost to implement the revised business associate agreement provisions of the Privacy and Security Rules. Covered entities may have existing contracts that are not set to terminate or expire until after the compliance date of the modifications to the Rules, and we understand that a six month compliance period may not provide enough time to reopen and renegotiate all contracts. In response to these concerns, we proposed to relieve some of the burden on covered entities and business associates in complying with the revised business associate provisions by adding a transition provision to grandfather certain existing contracts for a specified period of time. The Department’s authority to add the transition provision is set forth in § 160.104(c), which allows the Secretary to establish the compliance date for any modified standard or implementation specification, taking into account the extent of the modification and the time needed to comply with the modification. The proposed transition period would prevent rushed and hasty changes to thousands of on-going existing business associate agreements. We addressed the issue of the business associate transition provisions as follows. E:\FR\FM\25JAR2.SGM 25JAR2 sroberts on DSK5SPTVN1PROD with Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations We proposed new transition provisions at § 164.532(d) and (e) to allow covered entities and business associates (and business associates and business associate subcontractors) to continue to operate under certain existing contracts for up to one year beyond the compliance date of the revisions to the Rules. The additional transition period would be available to a covered entity or business associate if, prior to the publication date of the modified Rules, the covered entity or business associate had an existing contract or other written arrangement with a business associate or subcontractor, respectively, that complied with the prior provisions of the HIPAA Rules and such contract or arrangement was not renewed or modified between the effective date and the compliance date of the modifications to the Rules. The proposed provisions were intended to allow those covered entities and business associates with valid contracts with business associates and subcontractors, respectively, to continue to disclose protected health information to the business associate or subcontractor, or to allow the business associate or subcontractor to continue to create or receive protected health information on behalf of the covered entity or business associate, for up to one year beyond the compliance date of the modifications, regardless of whether the contract meets the applicable contract requirements in the modifications to the Rules. With respect to business associates and subcontractors, the proposal would grandfather existing written agreements between business associates and subcontractors entered into pursuant to § 164.504(e)(2)(ii)(D) (which requires the business associate to ensure that its agents with access to protected health information agree to the same restrictions and conditions that apply to the business associate). The Department proposed to deem such contracts to be compliant with the modifications to the Rules until either the covered entity or business associate has renewed or modified the contract following the compliance date of the modifications, or until the date that is one year after the compliance date, whichever is sooner. In cases where a contract renews automatically without any change in terms or other action by the parties (also known as ‘‘evergreen contracts’’), the Department intended that such evergreen contracts would be eligible for the extension and that deemed compliance would not terminate when these contracts automatically rolled VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 over. These transition provisions would have applied to covered entities and business associates only with respect to written contracts or other written arrangements as specified above, and not to oral contracts or other arrangements. These transition provisions would have only applied to the requirement to amend contracts; they would not affect any other compliance obligations under the HIPAA Rules. For example, beginning on the compliance date of this rule, a business associate may not use or disclose protected health information in a manner that is contrary to the Privacy Rule, even if the business associate’s contract with the covered entity has not yet been amended. Overview of Public Comments Many commenters supported the 1year extended timeframe for compliance with the business associate agreement provisions. Some commenters suggested longer timeframes, citing cost and resource limitations. Some commenters suggested that the Department should deem compliant all business associate agreements that have been renegotiated in good faith to meet the February 2010 effective date of the applicable provisions in the HITECH Act. Some commenters suggested that the Department recognize as compliant business associate agreements with provisions requiring compliance with all applicable laws. Final Rule The final rule adopts the proposal, adding new transition provisions at § 164.532(d) and (e) to allow covered entities and business associates (and business associates and business associate subcontractors) to continue to operate under certain existing contracts for up to one year beyond the compliance date of the revisions to the Rules. We decline to provide a longer time for compliance with the business associate agreement provisions. We provided a similar transition period for revising agreements in the 2002 modifications to the HIPAA Rules, and it was our experience that such time was sufficient to ease burden on the entities and allow most agreements to be modified at the time they would otherwise come up for renewal or renegotiation. With respect to those business associate agreements that already have been renegotiated in good faith to meet the applicable provisions in the HITECH Act, covered entities should review such agreements to determine whether they meet the final rule’s provisions. If PO 00000 Frm 00039 Fmt 4701 Sfmt 4700 5603 they do not, these covered entities then have the transition period to make whatever additional changes are necessary to conform to the final rule. The transition period is also available to those agreements that require compliance with all applicable laws (to the extent the agreements were otherwise in compliance with the HIPAA Rules prior to this final rule), but that do not fully meet the new requirements in this final rule. However, we do not deem such contracts as compliant beyond the transition period because they would not sufficiently reflect the new requirements. 4. Section 164.508—Uses and Disclosures for Which an Authorization Is Required a. Sale of Protected Health Information Proposed Rule Section 164.508 of the Privacy Rule permits a covered entity to use and disclose protected health information for purposes not otherwise permitted by the Rule if it has obtained a valid written authorization from the individual who is the subject of the information. This section also specifies two circumstances in which authorization from the individual must be obtained: (1) Most uses and disclosures of psychotherapy notes; and (2) uses and disclosures for marketing purposes. Section 13405(d) of the HITECH Act added a third circumstance that requires authorization, specifically the sale of protected health information. Section 13405(d)(1) prohibits a covered entity or business associate from receiving direct or indirect remuneration in exchange for the disclosure of protected health information unless the covered entity has obtained an individual’s authorization pursuant to § 164.508 that states whether the protected health information can be further exchanged for remuneration by the entity receiving the information. Section 13405(d)(2) contains several exceptions to the authorization requirement for circumstances where the purpose of the exchange is for: (1) Public health activities, as described at § 164.512(b) of the Privacy Rule; (2) research purposes as described at §§ 164.501 and 164.512(i) of the Rule, if the price charged for the information reflects the cost of preparation and transmittal of the data; (3) treatment of the individual; (4) the sale, transfer, merger or consolidation of all or part of a covered entity and for related due diligence; (5) services rendered by a business associate pursuant to a E:\FR\FM\25JAR2.SGM 25JAR2 sroberts on DSK5SPTVN1PROD with 5604 Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations business associate agreement and at the specific request of the covered entity; (6) providing an individual with access to his or her protected health information pursuant to § 164.524; and (7) other purposes as the Secretary deems necessary and appropriate by regulation. Section 13405(d)(4) of the Act provides that the prohibition on sale of protected health information applies to disclosures occurring six months after the date of the promulgation of the final regulations implementing this section. To implement section 13405(d) of the HITECH Act, we proposed to add a general rule at § 164.508(a)(4) requiring a covered entity to obtain an authorization for any disclosure of protected health information in exchange for direct or indirect remuneration from or on behalf of the recipient of the information and to require that the authorization state that the disclosure will result in remuneration to the covered entity. Consistent with the HITECH Act, the NPRM proposed to exclude several disclosures of protected health information made in exchange for remuneration from this general rule. As provided in the Act, these requirements would also apply to business associates of covered entities. In the NPRM we did not include language at § 164.508(a)(4) to require that the authorization under § 164.508 specify whether the protected health information disclosed by the covered entity for remuneration could be further exchanged for remuneration by the entity receiving the information. The statute refers to obtaining a valid authorization that includes a remuneration statement in accordance with § 164.508. The remuneration statement required by § 164.508 is whether remuneration will be received by the covered entity with respect to the disclosures subject to the authorization. This puts the individual on notice that the disclosure involves remuneration and thus, enables the individual to make an informed decision as to whether to sign the authorization. Thus, we interpreted the statute to mean that the authorization must include a statement that the covered entity is receiving direct or indirect remuneration in exchange for the protected health information. We note that these exact words do not need to be used in the statement. We provide discretion for covered entities to craft appropriate language that reflects, for example, the specific type of remuneration they receive. As we explained in the NPRM, with respect to the recipient of the information, if protected health information is VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 disclosed for remuneration by a covered entity or business associate to another covered entity or business associate in compliance with the authorization requirements at proposed § 164.508(a)(4)(i), the recipient covered entity or business associate could not redisclose the protected health information in exchange for remuneration unless a valid authorization was obtained in accordance with proposed § 164.508(a)(4)(i). We requested comment on these provisions. At proposed § 164.508(a)(4)(ii), we set forth the exceptions to the authorization requirement. We proposed the exceptions provided for by section 13405(d)(2) of the HITECH Act, and also proposed to exercise the authority granted to the Secretary in section 13405(d)(2)(G) to include additional exceptions that we deemed to be similarly necessary and appropriate. These exceptions are discussed below. We requested comment on whether there were additional exceptions that should be included in the final regulation. First, we proposed to include an exception to cover exchanges for remuneration for public health activities pursuant to §§ 164.512(b) or 164.514(e). We added the reference to § 164.514(e) of the Privacy Rule to ensure that disclosures of protected health information for public health activities in limited data set form would also be excepted from the authorization requirement, in addition to disclosures that may occur under § 164.512(b) with more identifiable information. With respect to the exception for public health disclosures, section 13405(d)(3)(A) of the HITECH Act requires that the Secretary evaluate the impact on public health activities of restricting this exception to require that the price charged for the data reflects only the costs of preparation and transmittal of the data, including those conducted by or for the use of the Food and Drug Administration (FDA). Section 13405(d)(3)(B) further provides that if the Secretary finds that such further restriction will not impede public health activities, the restriction may then be included in the regulations. We did not propose to include such a restriction on remuneration in the Rule, but requested public comment to assist us in evaluating the impact of doing so. The NPRM also included an exception for disclosures of protected health information for research purposes, pursuant to §§ 164.512(i) or 164.514(e), in exchange for which the covered entity receives only a reasonable, cost based fee to cover the PO 00000 Frm 00040 Fmt 4701 Sfmt 4700 cost to prepare and transmit the information for research purposes. Like the public health exception, we proposed to add a reference to § 164.514(e) to ensure that this exception would also apply to the disclosure of protected health information in limited data set form for research purposes. We requested public comment on the types of costs that should be permitted under this provision. We proposed to create an exception from the authorization requirement for disclosures of protected health information for treatment and payment purposes. Though the Act only addressed treatment, we proposed to also except disclosures for payment for health care from the remuneration prohibition to make clear that the exchange of protected health information to obtain ‘‘payment,’’ as such term is defined in the Privacy Rule at § 164.501, would not be considered a sale of protected health information. Consistent with section 13405(d)(2)(D) of the HITECH Act, we proposed to except from the authorization requirement disclosures described in paragraph (6)(iv) of the definition of health care operations at § 164.501, that is, disclosures for the sale, transfer, merger, or consolidation of all or part of a covered entity, or an entity that following such activity will become a covered entity, and due diligence related to such activity. We proposed to provide an exception from the authorization requirement for disclosures of protected health information to or by a business associate for activities that the business associate undertakes on behalf of a covered entity pursuant to §§ 164.502(e) and 164.504(e) of the Privacy Rule, as long as the only remuneration provided is by the covered entity to the business associate for the performance of such activities. This exception would exempt from the authorization requirement at § 164.508(a)(4)(i) a disclosure of protected health information by a covered entity to a business associate or by a business associate to a third party on behalf of the covered entity as long as any remuneration received by the business associate was for the activities performed by the business associate pursuant to a business associate contract. We proposed to except from the authorization requirement disclosures of protected health information by a covered entity to an individual when requested under §§ 164.524 (providing a right to access protected health information) or 164.528 (providing a right to receive an accounting of E:\FR\FM\25JAR2.SGM 25JAR2 sroberts on DSK5SPTVN1PROD with Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations disclosures). While section 13405(d)(2)(F) of the HITECH Act explicitly refers only to disclosures under § 164.524, we exercised our authority under section 13405(d)(2)(G) of the HITECH Act to likewise include in the exception disclosures to the individual under § 164.528. Section 164.524 permits a covered entity to impose a reasonable, cost-based fee for the provision of access to an individual’s protected health information upon request. Section 164.528 requires a covered entity to provide a requesting individual with an accounting of disclosures without charge in any 12-month period but permits a covered entity to impose a reasonable, cost-based fee for each subsequent request for an accounting of disclosures during that 12-month period. Therefore, a disclosure of protected health information under § 164.528 is similar to a disclosure under § 164.524 in that a covered entity may be paid a fee for making the disclosure. Pursuant to the authority granted to the Secretary in section 13405(d)(2)(G) of the HITECH Act, we proposed an additional exception for disclosures that are required by law as permitted under § 164.512(a) of the Privacy Rule. Finally, we proposed an exception, pursuant to the authority granted to the Secretary in section 13405(d)(2)(G), for disclosures of protected health information for any other purpose permitted by and in accordance with the applicable requirements of the Privacy Rule, as long as the only remuneration received by the covered entity is a reasonable, cost based fee to cover the cost to prepare and transmit the protected health information for such purpose or is a fee otherwise expressly permitted by other law. We proposed this exception to ensure that the authorization requirement would not deter covered entities from disclosing protected health information for permissible purposes under the Privacy Rule just because they routinely receive payment equal to the cost of preparing, producing, and transmitting the protected health information. We emphasized that this proposed exception would not apply if a covered entity received remuneration above the actual cost incurred to prepare, produce, and transmit the protected health information for the permitted purpose, unless such fee is expressly permitted by other law. As explained in the NPRM, we recognize that many States have laws in place to limit the fees a health care provider can charge to prepare, copy, and transmit medical records. Under VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 these laws, there is great variation regarding the types of document preparation activities for which a provider can charge as well as the permissible fee schedules for such preparation activities. Some States simply require any reasonable costs incurred by the provider in making copies of the medical records to be paid for by the requesting party, while other States set forth specific cost limitations with respect to retrieval, labor, supplies, and copying costs and allow charges equal to actual mailing or shipping costs. Many of these State laws set different cost limitations based on the amount and type of information to be provided, taking into account whether the information is in paper or electronic form as well as whether the requested material includes x-rays, films, disks, tapes, or other diagnostic imaging. The proposed exception would permit recoupment of fees expressly permitted by these other laws. Overview of Public Comments Many commenters asked for clarification on the scope of activities that constitute a ‘‘sale of protected health information.’’ Several of these commenters asked that the final rule include a definition of ‘‘sale of protected health information’’ and argued that the proposed language at § 164.508(a)(4) was too broad and had the potential to capture a number of activities that should not constitute a ‘‘sale’’ of protected health information. Commenters made a variety of suggestions in this regard, including suggesting that a definition of sale should focus on the transfer of ownership of protected health information and thus exclude disclosures pursuant to an access agreement, license, or lease that appropriately limits a recipient’s uses or disclosures of the information; or that a definition of sale should more clearly capture those disclosures where remuneration is provided in exchange for protected health information, rather than all disclosures that may involve remuneration. A number of commenters were concerned that fees paid for services or programs that involve the disclosure of protected health information but that are not fees to purchase the data themselves nonetheless would turn such disclosure into a sale of protected health information. For example, some commenters were concerned that the disclosure of research results to a research sponsor would be a sale of protected health information because the sponsor paid the covered entity for its services in conducting the research PO 00000 Frm 00041 Fmt 4701 Sfmt 4700 5605 study or project. Other commenters expressed concern about the authorization requirements for the sale of protected health information applying to programs for which a covered entity receives funding and, as a condition of that funding, is required to report data, such as under the Medicare and Medicaid incentive payment programs for meaningful users of certified electronic health record technology and certain State grant programs. A few commenters were concerned that the exchange of protected health information through a health information exchange (HIE) that is paid for through fees assessed on HIE participants could be considered sale of protected health information. Commenters also asked for clarification on the meaning and scope of the term ‘‘direct and indirect remuneration,’’ and some were particularly concerned that ‘‘indirect remuneration’’ meant nonfinancial benefits provided in exchange for protected health information could turn a disclosure into a sale of protected health information. Some commenters stated that prohibiting the receipt of indirect remuneration or nonfinancial benefits may eliminate any incentive for covered entities to participate in certain collaborative research or quality activities, in which covered entities contribute data to a centralized database to create aggregate data sets and in return may receive a number of nonfinancial benefits, such as the ability to use the aggregated information for research or access to quality assurance/ quality improvement tools. Certain commenters argued that the term indirect in the statute modifies the ‘‘receipt’’ of remuneration (i.e., that the statute also applies to the situation where the remuneration is provided by a third party on behalf of the recipient of the protected health information) and not the type of remuneration. The public health exception to the remuneration prohibition received a significant amount of support from commenters. Several commenters expressed specific support for the proposal to expand the exception to also apply to disclosures of limited data sets for public health purposes. With respect to the request for comment on the impact of restricting this exception to require that the price charged for the data reflects on the costs of preparing and transmitting the data, commenters were generally opposed to imposing such a restriction. Commenters stated that it may be difficult and burdensome to determine if some of a covered entity’s routine public health reporting involve any type of remuneration and E:\FR\FM\25JAR2.SGM 25JAR2 sroberts on DSK5SPTVN1PROD with 5606 Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations that a cost-based restriction on remuneration would discourage and impede covered entities from making important public health disclosures. One commenter was opposed to the public health exception altogether, stating that it is a privacy loophole that eliminates consumer control over their protected health information. Many respondents to the proposed sale prohibition commented on the proposed exception for research. While most commenters supported including an exception for research disclosures, including disclosures of limited data sets for research, many argued that the exception should not be limited to the receipt of a reasonable cost-based fee to prepare and transmit the data as such a fee limitation could impede important research efforts. A number of commenters specifically opposed imposing a fee limitation on the disclosure of limited data sets. If a fee limitation were retained, commenters argued that it should be broadly construed. The majority of commenters on this issue supported the proposed exceptions to the remuneration prohibition for treatment and health care payment purposes, as necessary so as not to impede these core health care functions. Overall, support was also expressed by those who commented on the exception for the sale, transfer, merger, or consolidation of a covered entity. Further, commenters generally agreed that a covered entity should be permitted to disclose protected health information without individual authorization as required by law, even if remuneration is received in exchange for the disclosure. Commenters also submitted a number of comments and questions regarding the ability of business associates to receive fees under both the proposed exception specifically for fees paid by a covered entity to a business associate and the general exception that would allow a covered entity to receive a reasonable, cost-based fee to cover the costs to prepare and transmit the data or a fee otherwise expressly permitted by other law for any disclosure permitted by the Privacy Rule. While commenters generally supported these exceptions, commenters were concerned that these exceptions appeared not to cover the common situation where a business associate, rather than the covered entity, receives remuneration from a third party for making a permitted disclosure under the Privacy Rule. For example, a number of commenters stated that covered entities often outsource to release of information (ROI) vendors the processing of requests for copies of medical records from third parties and VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 that these vendors and not the covered entities bill for the reasonable costs of providing the records to the requestors. Commenters asked that the final rule clarify that business associates can continue to receive payment of costs from third parties for providing this service on behalf of covered entities. Another commenter requested that the final rule clarify that the exception for remuneration to a business associate for activities performed on behalf of a covered entity also applies to remuneration received by subcontractors performing services on behalf of business associates. Finally, several commenters also responded to the proposed rule’s request for comment on the general exception at § 164.508(a)(4)(ii)(H) by suggesting costs that they believed should be permitted, including but not limited to costs for: preparing, producing, and transmitting protected health information; retrieval, labor, supplies, and copying costs; personnel and overhead costs; investments and indirect costs; and any costs that are in compliance with State law. Final Rule The final rule adopts the HITECH Act’s prohibition on the sale of protected health information but makes certain changes to the provisions in the proposed rule to clarify the scope of the provisions and otherwise address certain of commenters’ concerns. First, we have moved the general prohibition on the sale of protected health information by a covered entity or business associate to § 164.502(a)(5)(ii) and created a definition of ‘‘sale of protected health information.’’ Numerous commenters requested that the Privacy Rule include a definition of sale to better clarify what types of transactions fall within the scope of the provisions. Accordingly, § 164.502(a)(5)(ii)(B)(1) defines ‘‘sale of protected health information’’ to generally mean ‘‘a disclosure of protected health information by a covered entity or business associate, if applicable, where the covered entity or business associate directly or indirectly receives remuneration from or on behalf of the recipient of the protected health information in exchange for the protected health information.’’ Section 164.502(a)(5)(ii)(B)(2) then excludes from the definition the various exceptions that were in the proposed rule (discussed further below). We do not limit a ‘‘sale’’ to those transactions where there is a transfer of ownership of protected health information as some commenters suggested. The HITECH Act does not PO 00000 Frm 00042 Fmt 4701 Sfmt 4700 include such a limitation and the Privacy Rule rights and protections apply to protected health information without regard to ownership interests over the data. Thus, the sale provisions apply to disclosures in exchange for remuneration including those that are the result of access, license, or lease agreements. In addition, we do not consider sale of protected health information in this provision to encompass payments a covered entity may receive in the form of grants, or contracts or other arrangements to perform programs or activities, such as a research study, because any provision of protected health information to the payer is a byproduct of the service being provided. Thus, the payment by a research sponsor to a covered entity to conduct a research study is not considered a sale of protected health information even if research results that may include protected health information are disclosed to the sponsor in the course of the study. Further, the receipt of a grant or funding from a government agency to conduct a program is not a sale of protected health information, even if, as a condition of receiving the funding, the covered entity is required to report protected health information to the agency for program oversight or other purposes. (Certain of these disclosures would also be exempt from the sale requirements, depending on whether the requirement to report data was included in regulation or other law.) Similarly, we clarify that the exchange of protected health information through a health information exchange (HIE) that is paid for through fees assessed on HIE participants is not a sale of protected health information; rather the remuneration is for the services provided by the HIE and not for the data itself. (Such disclosures may also be exempt from these provisions under the exception for disclosures to or by a business associate that is being compensated by a covered entity for its services.) In contrast, a sale of protected health information occurs when the covered entity primarily is being compensated to supply data it maintains in its role as a covered entity (or business associate). Thus, such disclosures require the individual’s authorization unless they otherwise fall within an exception at § 164.502(a)(5)(ii)(B)(2). For example, a disclosure of protected health information by a covered entity to a third party researcher that is conducting the research in exchange for remuneration would fall within these provisions, unless the only E:\FR\FM\25JAR2.SGM 25JAR2 sroberts on DSK5SPTVN1PROD with Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations remuneration received is a reasonable, cost-based fee to cover the cost to prepare and transmit the data for such purposes (see below). In response to questions by commenters, we also clarify the scope of the term ‘‘remuneration.’’ The statute uses the term ‘‘remuneration,’’ and not ‘‘payment,’’ as it does in the marketing provisions at section 13406(a). Because the statute uses different terms, we do not believe that remuneration as applied to the sale provisions is limited to financial payment in the same way it is so limited in the marketing provisions. Thus, the prohibition on sale of protected health information applies to the receipt of nonfinancial as well as financial benefits. In response to commenters who indicated that the statute’s terms ‘‘direct and indirect’’ apply to how the remuneration is received rather than the remuneration itself, we agree and have moved the terms in the definition to further make clear that the provisions prohibit the receipt of remuneration not only from the third party that receives the protected health information but also from another party on behalf of the recipient of the protected health information. However, this does not change the scope of the term ‘‘remuneration.’’ As discussed above, we interpret the statute to mean that nonfinancial benefits are included in the prohibition. Thus, a covered entity or business associate may not disclose protected health information in exchange for in kind benefits, unless the disclosure falls within one of the exceptions discussed below. Consider, for example, a covered entity that is offered computers in exchange for disclosing protected health information. The provision of protected health information in exchange for the computers would not be considered a sale of protected health information if the computers were solely used for the purpose of preparing and transmitting protected health information to the person collecting it and were returned when such disclosure was completed. However, if the covered entity is permitted to use the computers for other purposes or to keep the computers even after the disclosures have been made, then the covered entity has received in kind remuneration in exchange for the protected health information above what is needed to make the actual disclosures. We retain in the final rule the broad exception for disclosures for public health purposes made pursuant to §§ 164.512(b) and 164.514(e). Based on the concerns from the public comment that narrowing the exception could VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 discourage voluntary public health reporting, we do not limit the exception to only those disclosures where all the covered entity receives as remuneration is a cost-based fee to cover the cost to prepare and transmit the data. With respect to the exception for research disclosures, the final rule adopts the language as proposed, including the cost-based fee limitation provided for in the HITECH Act. Thus, disclosures for research purposes are excepted from the remuneration prohibition to the extent that the only remuneration received by the covered entity or business associate is a reasonable cost-based fee to cover the cost to prepare and transmit the protected health information for such purposes. We do not remove the fee limitation as requested by some commenters; the statutory language included in Section 13405(d)(2)(B) of the HITECH Act clearly states that any remuneration received in exchange for research disclosures must reflect only the cost of preparation and transmittal of the data for such purpose. In response to comments about the types of costs that are permitted in the reasonable cost-based fee to prepare and transmit the data, we clarify that this may include both direct and indirect costs, including labor, materials, and supplies for generating, storing, retrieving, and transmitting the protected health information; labor and supplies to ensure the protected health information is disclosed in a permissible manner; as well as related capital and overhead costs. However, fees charged to incur a profit from the disclosure of protected health information are not allowed. We believe allowing a profit margin would not be consistent with the language contained in Section 13405 of the HITECH Act. We intend to work with the research community to provide guidance and help the research community reach a common understanding of appropriate cost-based limitations on remuneration. We retain the exceptions proposed for treatment and payment disclosures without modification and agree with commenters that these exceptions are necessary to make clear that these core health care functions may continue. Similarly, we retain the exception to the remuneration prohibition for disclosures for the transfer, merger, or consolidation of all or part of a covered entity with another covered entity, or an entity that following such activity will become a covered entity, and related due diligence, to ensure that such disclosures may continue to occur in accordance with the Privacy Rule. We retain the proposed exception for PO 00000 Frm 00043 Fmt 4701 Sfmt 4700 5607 disclosures that are otherwise required by law to ensure a covered entity can continue to meet its legal obligations without imposing an authorization requirement. We also retain the exception for disclosures to the individual to provide the individual with access to protected health information or an accounting of disclosures, where the fees charged for doing so are in accord with the Privacy Rule. We adopt the exceptions for remuneration paid by a covered entity to a business associate for activities performed on behalf of a covered entity, as well as the general exception permitting a covered entity to receive remuneration in the form of a reasonable, cost-based fee to cover the cost to prepare and transmit the protected health information for any disclosure otherwise permitted by the Privacy Rule. However, we make a number of clarifications to address commenters questions and concerns regarding the ability of a business associate rather than a covered entity to receive the permitted remuneration. First, we add the term ‘‘business associate’’ in the general exception permitting reasonable, cost-based fees to prepare and transmit data (or fees permitted by State laws) to make clear that business associates may continue to recoup fees from third party record requestors for preparing and transmitting records on behalf of a covered entity, to the extent such fees are reasonable, cost-based fees to cover the cost to prepare and transmit the protected health information or otherwise expressly permitted by other law. Second, we clarify in the business associate exception that the exception would also cover remuneration by a business associate to its subcontractor for activities performed by the subcontractor on behalf of the business associate. Finally, we add the term ‘‘business associate’’ to the general prohibition on sale of protected health information for consistency, even though, without the addition, a business associate still would not be permitted to sell protected health information as a business associate may generally only make uses and disclosures of protected health information in manners in which a covered entity would be permitted under the Privacy Rule. With respect to the types of costs that would be permitted as part of a reasonable, cost-based fee under this provision, we clarify that the final rule permits the same types of costs under this exception as the research exception, as well as costs that are in compliance with a fee schedule provided by State E:\FR\FM\25JAR2.SGM 25JAR2 5608 Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations sroberts on DSK5SPTVN1PROD with law or otherwise expressly permitted by other applicable law. Thus, costs may include the direct and indirect costs to prepare and transmit the data, including labor, materials, and supplies, but not a profit margin. We intend to continue to work with interested stakeholders to develop more guidance on direct and indirect costs and on remuneration. Response to Other Public Comments Comment: Several commenters suggested that we make clear in the final rule that redisclosures of information by a recipient covered entity or business associate even for remuneration that are set forth in the original authorization are not restricted by this provision. Another commenter argued that the original authorization form should indicate whether the recipient of the protected health information will further exchange the information for remuneration. Response: It is expected to be the usual case that if a covered entity or business associate that receives protected health information in exchange for remuneration wishes to further disclose that information in exchange for remuneration, then an additional authorization in accordance with § 164.508 must be obtained because such disclosures will not be encompassed by the original authorization. However, it may be possible that redisclosures of information for remuneration by a recipient covered entity or business associate do not require an additional authorization, provided it is sufficiently clear to the individual in the original authorization that the recipient covered entity or business associate will further disclose the individual’s protected health information in exchange for remuneration. In response to the commenter that argued that the original authorization form should indicate whether the recipient of the protected health information will further exchange the information for remuneration, as explained above we believe the language included in Section 13405 of the HITECH Act was to alert the individual as to whether the disclosures he or she was authorizing at the time involved remuneration. Where the recipient of protected health information pursuant to an authorization is a third party that is not a covered entity or business associate, we do not have authority to require that entity to disclose to the disclosing covered entity or business associate whether it plans to further exchange the protected health information for remuneration for purposes of including such information on the authorization VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 form. However, covered entities that are informed of such information may include it on the authorization form if they wish to. In any event, the Privacy Rule retains the requirement that an authorization inform the individual of the potential for information disclosed pursuant to the authorization to be subject to redisclosure by the recipient and to no longer be subject to the Privacy Rule. Comment: Several commenters asked for clarification on the effect the final rule will have on existing research efforts and some suggested that HHS should grandfather in all Privacy Rule authorizations for research obtained under existing law before the effective date of the final rule. These commenters believed addressing current research would be necessary to ensure the rule would not frustrate ongoing research efforts. Response: We agree that ongoing research studies that are based on a prior permission under the Privacy Rule for the research use or disclosure of protected health information should be grandfathered so as not to disrupt these ongoing studies. We have added a reference to the authorization requirements that apply to the sale of protected health information at § 164.508(a)(4) to make clear that the transition provisions in § 164.532 apply to permissions existing prior to the applicable compliance date of the Rule. Thus, a covered entity may continue to rely on an authorization obtained from an individual prior to the compliance date even if remuneration is involved but the authorization does not indicate that the disclosure is in exchange for remuneration. This would apply to authorizations for any permissible purpose under the Rule and not just for research purposes. Further, in the research context, where a covered entity obtained documentation of a waiver of authorization from an Institutional Review Board or Privacy Board prior to the compliance date for this final rule, the covered entity may continue to rely on that documentation to release protected health information to a researcher, even if the covered entity receives remuneration in the form of more than a reasonable, cost based fee to prepare and transmit the data. Finally, we also provide at new § 164.532(f) that a covered entity may continue to use or disclose a limited data set in accordance with an existing data use agreement that meets the requirements of § 164.514(e), including for research purposes, until the data use agreement is renewed or modified or until one year from the compliance date of this final rule, whichever is earlier, PO 00000 Frm 00044 Fmt 4701 Sfmt 4700 even if such disclosure would otherwise constitute a sale of protected health information upon the effective date of this rule. Comment: Some commenters were concerned that the sale prohibition would apply to a covered entity’s sale of accounts receivable including protected health information to a collection agency, arguing that such disclosures should remain permissible without authorization as a payment disclosure. Response: Disclosures of protected health information for payment collection activities are permitted without authorization as a payment disclosure under the Privacy Rule (see §§ 164.501 and 164.506(a)) and thus, are excepted from the remuneration prohibition at § 164.502(a)(5)(ii)(B)(2)(iii). Comment: A few commenters asked that the final rule clarify that transfers of value among entities under common control does not implicate the authorization requirements. Similarly, some commenters sought clarification on whether business transfers on the books for internal reorganization would also be excluded under the transfer, merger, and consolidation exception to the final rule. Response: First, we clarify that uses of protected health information within a covered entity that is a single legal entity are not implicated by the remuneration prohibition as the prohibition applies only to disclosures outside of a covered entity. Second, the use of protected health information among legally separate covered entities under common ownership or control that have designated themselves as an affiliated covered entity (i.e., a single covered entity for purposes of compliance with the HIPAA Rules) is not implicated. See the requirements for affiliated covered entities at § 164.105(b). Thus, to the extent that what the commenters contemplate is an otherwise permissible use of protected health information within a single legal entity that is a covered entity or an affiliated covered entity, such use of data is not impacted by these provisions. Third, disclosures of protected health information for the sale, transfer, merger, or consolidation of all or part of a covered entity with another covered entity, or with an entity that following such activity will become a covered entity and due diligence related to such activity are excepted from the definition of sale of protected health information at § 164.502(a)(5)(ii)(B)(2)(iv). Comment: Some commenters expressed concern over the role the E:\FR\FM\25JAR2.SGM 25JAR2 sroberts on DSK5SPTVN1PROD with Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations Institutional Review Board will play in determining reasonable costs, and several commenters asked that the final rule clarify that the Institutional Review Board is not responsible for making a determination regarding the permissibility of the fees paid in exchange for a disclosure of protected health information for research purposes. Response: We clarify that a covered entity, or business associate if applicable, is responsible for determining whether any fees paid to the entity in exchange for protected health information covers the covered entity’s or business associate’s costs to prepare and transmit protected health information for research. Comment: A few commenters sought clarification on how to differentiate access to protected health information from access to statistical data, particularly when remuneration is provided for access to a database but the party is solely interested in a population study, not an individual’s protected health information. Response: Disclosures of health information that has been de-identified in accordance with the Privacy Rule at § 164.514(b)–(d) are not subject to the remuneration prohibition as such information is not protected health information under the Rule. However, a covered entity that allows a third party access to a database containing protected health information in exchange for remuneration is subject to these provisions unless an exception applies (e.g., the remuneration received is limited to a reasonable, cost-based fee to prepare and make available the data). Comment: A number of commenters argued that limited data sets should be exempted entirely from the remuneration prohibition because they are not fully identifiable data sets and are subject to protections under data use agreements. Response: We decline to completely exempt limited data sets from these provisions as, unlike de-identified data, they are still protected health information. However, disclosures of limited data sets for purposes permitted under the Rule would be exempt from the authorization requirements to the extent the only remuneration received in exchange for the data is a reasonable, cost-based fee to prepare and transmit the data or a fee otherwise expressly permitted by other law. We also provide at new § 164.532(f) that a covered entity may continue to use or disclose a limited data set in accordance with an existing data use agreement that meets the requirements of § 164.514(e), including for research purposes, until VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 the data use agreement is renewed or modified or until one year from the compliance date of this final rule, whichever is earlier, even if such disclosure would otherwise constitute a sale of protected health information upon the effective date of this rule. b. Research i. Compound Authorizations Proposed Rule Section 164.508(b)(4) of the Privacy Rule prohibits covered entities from conditioning treatment, payment, enrollment in a health plan, or eligibility for benefits on the provision of an authorization. This limitation is intended to ensure that authorization from an individual for a use or disclosure of protected health information is voluntarily provided. However, there are exceptions to this general rule for certain circumstances, including in the research context, where a covered entity may condition the provision of research-related treatment, such as in a clinical trial, on obtaining the individual’s authorization for the use or disclosure of protected health information for such research. Permitting the use of protected health information is part of the decision to receive care through a clinical trial, and health care providers conducting such trials are able to condition researchrelated treatment on the individual’s willingness to authorize the use or disclosure of protected health information for research associated with the trial. Section 164.508(b)(3) generally prohibits what are termed ‘‘compound authorizations,’’ i.e., where an authorization for the use and disclosure of protected health information is combined with any other legal permission. However, § 164.508(b)(3)(i) carves out an exception to this general prohibition, permitting the combining of an authorization for a research study with any other written permission for the same study, including another authorization or informed consent to participate in the research. Nonetheless, § 164.508(b)(3)(iii) prohibits combining an authorization that conditions treatment, payment, enrollment in a health plan, or eligibility for benefits (conditioned authorization) with an authorization for another purpose for which treatment, payment, enrollment, or eligibility may not be conditioned (unconditioned authorization). This limitation on certain compound authorizations was intended to help ensure that individuals understand that they may decline the activity described in the unconditioned authorization yet PO 00000 Frm 00045 Fmt 4701 Sfmt 4700 5609 still receive treatment or other benefits or services by agreeing to the conditioned authorization. The impact of these authorization requirements and limitations can be seen during clinical trials that are associated with a corollary research activity, such as when protected health information is used or disclosed to create or to contribute to a central research database or repository. For example, § 164.508(b)(3)(iii) prohibits covered entities from obtaining a single authorization for the use or disclosure of protected health information for a research study that includes both treatment as part of a clinical trial and tissue banking of specimens (and associated protected health information) collected, since the individual generally must sign the authorization for the use of his or her protected health information in the clinical trial in order to receive the research-related treatment (conditioned authorization) but whether the individual also signs the tissue banking authorization is completely voluntary and will not affect the individual receiving the research-related treatment (unconditioned authorization). Thus, covered entities must obtain separate authorizations from research participants for a clinical trial that also collects specimens with associated protected health information for a central repository. As stated in the NPRM, various groups, including researchers and professional organizations, have expressed concern at this lack of integration. A number of persons in the research community have stated that requiring separate forms for these corollary research activities is inconsistent with current practice under the Common Rule (45 CFR Part 46) with respect to obtaining informed consent and creates unnecessary documentation burdens. Persons have also indicated that the multiple authorization forms are potentially confusing to research subjects and/or may dissuade them altogether from participating in a clinical trial, and that redundant information on the forms diverts an individual’s attention from other content that describes how and why the personal health information may be used. In light of these concerns, the Secretary’s Advisory Committee on Human Research Protections in 2004 (Recommendation V, in a letter to the Secretary of HHS, available at https:// www.hhs.gov/ohrp/sachrp/ hipaalettertosecy090104.html), as well as the Institute of Medicine in its 2009 Report, ‘‘Beyond the HIPAA Privacy Rule: Enhancing Privacy, Improving Health Through Research’’ E:\FR\FM\25JAR2.SGM 25JAR2 5610 Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations sroberts on DSK5SPTVN1PROD with (Recommendation II.B.2), made specific recommendations to allow combined authorizations for clinical trials and biospecimen storage. To address these concerns and streamline the process in the Privacy Rule for obtaining an individual’s authorization for research, we proposed to amend § 164.508(b)(3)(i) and (iii) to allow a covered entity to combine conditioned and unconditioned authorizations for research, provided that the authorization clearly differentiates between the conditioned and unconditioned research components and clearly allows the individual the option to opt in to the unconditioned research activities. These provisions would allow covered entities to combine authorizations for the use and disclosure of protected health information for clinical trials and related biospecimen banking activities, as well as other scenarios that often occur in research studies. While we did not propose to alter the core elements or required statements integral to a valid authorization, we stated that covered entities would have some flexibility with respect to how they met the authorization requirements. For example, covered entities could facilitate an individual’s understanding of a compound authorization by describing the unconditioned research activity on a separate page of a compound authorization and could also crossreference relevant sections of a compound authorization to minimize the potential for redundant language. In addition, a covered entity could use a separate check-box for the unconditioned research activity to signify whether an individual has opted-in to the unconditioned research activity, while maintaining one signature line for the authorization, or alternatively provide a distinct signature line for the unconditioned authorization to signal that the individual is authorizing optional research that will not affect research-related treatment. We requested comment on additional methods that would clearly differentiate to the individual the conditioned and unconditioned research activities on the compound authorization. Overview of Public Comments Almost all commenters on this topic strongly supported the proposal to allow combined authorizations for conditioned and unconditioned research activities. Many commenters supported allowing flexibility for institutions to determine how best to differentiate the unconditioned authorization for the voluntary research VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 activity, including whether to use a check box with a single signature line, or separate signature lines. Several commenters suggested that an opt out method should be permitted as an alternative to an opt in approach. A few commenters opposed the proposal to allow compound authorizations for conditioned and unconditioned research activities. These commenters generally felt that separate authorizations are appropriate and that there is not sufficient evidence to suggest that combining the forms will be beneficial to individuals. The Secretary’s Advisory Committee on Human Research Protections, in its letter of comment on the Department’s NPRM, indicated its support for the proposal to permit compound authorizations for conditioned and unconditioned research activities, and expressed particular appreciation for the goal of harmonization with the Common Rule. The Secretary’s Advisory Committee on Human Research Protections also supported flexibility in the manner that the conditioned and unconditioned research activities are differentiated. The Secretary’s Advisory Committee on Human Research Protections requested clarification that the compound authorizations permitted under this proposal would be permissible for any type of combined research studies, and not exclusively for clinical trials with a biospecimen banking component. Final Rule The final rule adopts the proposal to amend § 164.508(b)(3)(i) and (iii) to allow a covered entity to combine conditioned and unconditioned authorizations for research, provided that the authorization clearly differentiates between the conditioned and unconditioned research components and clearly allows the individual the option to opt in to the unconditioned research activities. We intend this provision to allow for the use of compound authorizations for any type of research activities, and not solely to clinical trials and biospecimen banking, except to the extent the research involves the use or disclosure of psychotherapy notes. For research that involves the use or disclosure of psychotherapy notes, an authorization for a use or disclosure of psychotherapy notes may only be combined with another authorization for a use or disclosure of psychotherapy notes. See § 164.508(b)(3)(ii). Thus, aside from the use of psychotherapy notes, combined authorizations could be obtained for the use of protected health information in a clinical trial and optional sub-studies, PO 00000 Frm 00046 Fmt 4701 Sfmt 4700 as well as for biospecimen banking that also permits future secondary use of the data (to the extent the future use authorization is aligned with the discussion in the following section regarding authorizations for future research). Also, this provision continues to allow for a covered entity to combine such authorizations with informed consent documents for the research studies. The final rule provides covered entities, institutions, and Institutional Review Boards with flexibility to determine the best approach for clearly differentiating the conditioned and unconditioned research activities and giving research participants the option to opt in to the unconditioned research activities. We decline to permit a combined authorization that only allows the individual the option to opt out of the unconditioned research activities (e.g., ‘‘check here if you do NOT want your data provided to the biospecimen bank’’) because an opt out option does not provide individuals with a clear ability to authorize the optional research activity, and may be viewed as coercive by individuals. The final rule does not remove the requirement that an individual affirmatively authorize the unconditioned research activities; it merely provides flexibility to streamline the authorization process by combining the forms. With respect to the commenters that believed there is insufficient evidence that combining conditioned and unconditioned research activities into a compound authorization would be beneficial, and that such compound authorizations may be confusing for patients, as indicated above, there have been anecdotal reports to the Department that the use of multiple authorization forms has caused confusion among research subjects. Further, we note that these modifications do not remove the required elements of an authorization that are necessary to inform the individual about the study (e.g., description of the information to be used or disclosed, description of the purpose, etc.); they merely introduce flexibility to avoid redundant language that would otherwise be necessary to include in the authorizations for the multiple research activities. In addition, these changes are intended to align the HIPAA Privacy Rule’s authorization requirements with what has been common and ongoing practice in terms of the informed consent form under the Common Rule. We note that covered entities are permitted but not required by the modifications adopted at E:\FR\FM\25JAR2.SGM 25JAR2 Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations sroberts on DSK5SPTVN1PROD with § 164.508(b)(3)(i) and (iii) to create compound authorizations for conditioned and unconditioned research activities. Previously approved, ongoing studies may continue to rely on the separate authorization forms that were obtained under the prior provisions. For new studies, covered entities and researchers may continue to use separate authorizations for conditioned and unconditioned research activities, or may transition to compound authorizations as they deem appropriate, which can be used beginning on the effective date of this rule. Response to Other Public Comments Comment: The Secretary’s Advisory Committee on Human Research Protections asked whether the following approaches for distinguishing between conditioned and unconditioned research activities would be acceptable: Using (1) a combined consent/ authorization form for a clinical trial and optional banking component, with a check-box for the individual to have the choice to opt in to the optional banking component, and one signature; (2) a combined consent/authorization form for a clinical trial and optional banking component, with one signature for the clinical trial and another signature to indicate the individual agrees to the optional banking component; and (3) a combined consent/authorization form for a clinical trial and optional banking component, with a check box for the individual to have the choice to opt in to the banking component, and one signature, but with detailed information about the banking component presented in a separate brochure or information sheet that is referenced directly in the consent/ authorization form. Response: Covered entities and researchers have flexibility in the methods used to distinguish the conditioned and unconditioned research activities and to provide the individual with a clear opportunity to opt in to the unconditioned portion, and all of the above approaches would be acceptable provided, with respect to the third approach, that the brochure or information sheet is incorporated by reference into the authorization/consent form such that it is considered to be part of the form (even if not physically attached to the form). In addition, if the brochure or information sheet includes required elements of the authorization (or informed consent), and authorization/consent has not been altered by an Institutional Review Board, then the brochure or information sheet must be made available to VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 potential research participants before they are asked to sign the authorization/ consent document (unless the authorization form itself includes the required elements). Finally, in such cases, a covered entity must keep not only the signed authorization/consent form, but also a copy of the brochure or information sheet, in order to be in compliance with the documentation requirements at § 164.530(j). Comment: The Secretary’s Advisory Committee on Human Research Protections requested confirmation that the compound authorization proposal would not affect the waiver provisions currently existing in the Privacy Rule, such that such provisions could be used, if appropriate, for new studies distinct from both the original study and the banking activity. Response: The new compound authorization provision does not affect the waiver of authorization provisions in the Privacy Rule. A covered entity may continue to use or disclose protected health information for research purposes based on documentation that meets the requirements at § 164.512(i), indicating that an Institutional Review Board or Privacy Board has waived the obtaining of individual authorization for such purposes, based on a determination that (1) the use or disclosure of protected health information involves no more than a minimal risk to the privacy of individuals; (2) the research could not practicably be conducted without the waiver; and (3) the research could not practicably be conducted without access to and use of the protected health information. Comment: The Secretary’s Advisory Committee on Human Research Protections requested clarification on the effect of revoking only one part of a compound authorization. For example, if an individual signs a combined authorization for conditioned and unconditioned research activities and later specifically revokes only the unconditioned research activity (e.g., the banking component), then the covered entity may continue to act in reliance on the authorization for the conditioned component (e.g., the clinical trial). Response: Where it is clear that an individual is revoking only one part of a compound authorization, such revocation does not equate to a revocation of the entire authorization to include the other studies. However, where it is not clear exactly to which research activities the individual’s revocation applies, written clarification must be obtained from the individual in order for the revocation to apply only to PO 00000 Frm 00047 Fmt 4701 Sfmt 4700 5611 certain of the research activities identified in the authorization, or the entire authorization must be treated as revoked. Further, such revocations must be maintained and documented in a manner that will ensure uses and disclosures of protected health information for the activity to which the revocation applies discontinue, except to the extent the covered entity has already acted in reliance on the authorization, which would permit certain limited, continued use and disclosure, such as necessary to maintain the integrity of the research study. ii. Authorizing Future Research Use or Disclosure Prior Interpretation Research often involves obtaining health information and biological specimens to create a research database or repository for future research. For example, this frequently occurs where clinical trials are paired with corollary research activities, such as the creation of a research database or repository where information and specimens obtained from a research participant during the trial are transferred and maintained for future research. It is our understanding that Institutional Review Boards in some cases may approve an informed consent document for a clinical trial that also asks research participants to permit future research on their identifiable information or specimens obtained during the course of the trial. It is also our understanding that an Institutional Review Board may in some cases review an informed consent for a prior clinical trial to determine whether a subsequent research use is encompassed within the original consent. The Department has previously interpreted the Privacy Rule, however, to require that authorizations for research be study specific for purposes of complying with the Rule’s requirement at § 164.508(c)(1)(iv) that an authorization must include a description of each purpose of the requested use or disclosure. See 67 FR 53182, 53226, Aug. 14, 2002. In part, the Department’s interpretation was based on a concern that patients could lack necessary information in the authorization to make an informed decision about the future research. In addition, it was recognized that not all uses and disclosures of protected health information for a future research purpose would require a covered entity to re-contact the individual to obtain another authorization (e.g., uses or disclosures with a waiver of E:\FR\FM\25JAR2.SGM 25JAR2 sroberts on DSK5SPTVN1PROD with 5612 Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations authorization from an Institutional Review Board or Privacy Board as provided under § 164.512(i) or of a limited data set pursuant to a data use agreement under § 164.514(e) for the future research purpose). Subsequent to issuing this interpretation, the Department heard concerns from covered entities and researchers that the Department’s interpretation encumbers secondary research, and limits an individual’s ability to agree to the use or disclosure of their protected health information for future research. In addition, many commenters noted that the Department’s interpretation limiting the scope of a HIPAA authorization for research appeared to diverge from the current practice under the Common Rule with respect to the ability of a researcher to seek subjects’ informed consent to future research so long as the future research uses are described in sufficient detail to allow an informed consent. These commenters, as well as the Secretary’s Advisory Committee on Human Research Protections in 2004 (Recommendation IV, in a letter to the Secretary of HHS, available at https:// www.hhs.gov/ohrp/sachrp/ hipaalettertosecy090104.html) and the Institute of Medicine in its 2009 Report entitled ‘‘Beyond the HIPAA Privacy Rule: Enhancing Privacy, Improving Health Through Research’’ (Recommendation II.B.1), had urged the Department to allow the HIPAA authorization to permit future research use and disclosure of protected health information. Given these concerns, the Department explained in the NPRM that it was considering a number of options regarding authorizations for future research, including whether the Privacy Rule should: permit an authorization for uses and disclosures of protected health information for future research purposes to the extent such purposes are adequately described in the authorization such that it would be reasonable for the individual to expect that his or her protected health information could be used or disclosed for such future research; or permit an authorization for future research but require certain specific elements or statements with respect to the future research, particularly where the future research may encompass certain types of sensitive research activities, such as research involving genetic analyses or mental health research, that may alter an individual’s willingness to participate in the research. We requested comment on these options and on how a revocation would operate VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 with respect to future downstream research studies. Overview of Public Comments Almost all commenters on this topic supported the proposal to allow authorizations for future research. Many commenters indicated this flexibility to be important, particularly considering evolving technologies and discoveries. About half of these commenters specifically advocated for providing investigators and Institutional Review Boards with the maximum flexibility to determine the appropriateness of the descriptions for future research and felt that this would best align with the Common Rule. These commenters were thus against requiring specific statements in the Privacy Rule about the future research, including for sensitive research. Other commenters were in favor of requiring the additional statements about sensitive categories of research, stating that this would better inform individuals and give them greater choice in determining their willingness to participate in certain types of future research. A couple of these commenters recommended working with National Committee on Vital and Health Statistics on the categories of sensitive research, however no further examples of specific types of research were given beyond the examples provided in the proposed rule (genetic analyses or mental health research). Several commenters specifically advised against requiring specific statements for sensitive research, citing concerns of variability in what is considered sensitive information and practicality challenges due to the changing nature of the concept over time. A few commenters opposed the proposal to allow authorizations for future research altogether. Some of these commenters felt strongly that studyspecific authorizations are critical to protect patients, and are the only way that individuals can make a truly informed decision. These commenters suggested that outreach to patients and potential research participants to solicit feedback, as well as a study on the potential burdens that enhanced authorizations may have on stakeholders, were necessary before any changes were made. In its comment letter on the NPRM, the Secretary’s Advisory Committee on Human Research Protections supported the proposal to harmonize HIPAA authorizations with the Common Rule informed consent requirements, and also requested consultation with the FDA to ensure that authorizations for future research align not only with the PO 00000 Frm 00048 Fmt 4701 Sfmt 4700 Common Rule standards but also FDA standards for informed consent. They indicated that the authorization should be reasonably specific such that individuals are aware of the types of research that may be conducted. However, the Secretary’s Advisory Committee on Human Research Protections emphasized the need for flexibility to rely on Institutional Review Board judgment and recommended against requiring prescribed statements about certain types of ‘‘sensitive’’ research, since these concepts change over time and requiring prescribed authorization statements may conflict with Institutional Review Boards’ judgments about how to appropriately describe the research in the informed consent. Modified Interpretation We modify the prior Departmental interpretation that research authorizations must be study specific. This modification does not make any changes to the authorization requirements at § 164.508. A HIPAA authorization for future research must still address each of the core elements and statements required at § 164.508(c). However, the Department no longer interprets the ‘‘purpose’’ provision at § 164.508(c)(1)(iv) as requiring that an authorization for the use or disclosure of protected health information for research purposes be study specific. In order to satisfy the requirement that an authorization include a description of each purpose of the requested use or disclosure, an authorization for uses and disclosures of protected health information for future research purposes must adequately describe such purposes such that it would be reasonable for the individual to expect that his or her protected health information could be used or disclosed for such future research. This could include specific statements with respect to sensitive research to the extent such research is contemplated. However, we do not prescribe specific statements in the Rule. We agree that it is difficult to define what is sensitive and that this concept changes over time. We also agree with commenters that this approach best harmonizes with practice under the Common Rule regarding informed consent for future research, and allows covered entities, researchers and Institutional Review Boards to have flexibility in determining what adequately describes a future research purpose depending on the circumstances. We have consulted with Office for Human Research Protections (OHRP) and the FDA on this approach to ensure consistency and E:\FR\FM\25JAR2.SGM 25JAR2 Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations sroberts on DSK5SPTVN1PROD with harmonization with the HHS and FDA human subjects protections regulations, where appropriate. With respect to commenters that stated it is impossible for individuals to be truly informed about future research, we note that we are aligning with existing practice under the Common Rule in regard to informed consent and still require that all required elements of authorization be included in an authorization for future research, even if they are to be described in a more general manner than is done for specific studies. Pursuant to this modified interpretation, covered entities that wish to obtain individual authorization for the use or disclosure of protected health information for future research may do so at any time after the effective date of this final rule. Alternatively, covered entities may continue to use only study-specific authorizations for research if they choose. Response to Other Public Comments Comment: The Secretary’s Advisory Committee on Human Research Protections requested flexibility regarding the description in the authorization of the information to be used or disclosed for future research as well as to whom the covered entity may make the requested use or disclosure as there may be some uncertainty of the identity of future researchers. The Secretary’s Advisory Committee on Human Research Protections also suggested that the description of information to be collected be allowed to reference information beyond the time of the original study, for example ‘‘your future medical records [at Hospital]’’ or ‘‘your future medical records [relating to diseases/ conditions].’’ Response: Covered entities and researchers have flexibility to describe the information to be used or disclosed for the future research, so long as it is reasonable from such description to believe that the individual would expect the information to be used or disclosed for the future research. We also clarify that a description of the protected health information to be used for the future research may include information collected beyond the time of the original study. Further, the Privacy Rule authorization requirements allow a ‘‘class of persons’’ to be described for purposes of identifying in the authorization the recipients of the protected health information. Thus, covered entities and researchers have flexibility in the manner in which they describe the recipients of the protected health information for the future VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 research, so long as it is reasonable from such description to believe that the individual would expect his or her protected health information to be shared with such persons for the future research. Comment: The Secretary’s Advisory Committee on Human Research Protections requested that the Department allow for grandfathering of existing, ongoing studies that involve the possibility of future/secondary research, if an Institutional Review Board-approved consent reasonably informed the individuals of the future research. In these situations, researchers would have needed to obtain a studyspecific authorization or waiver of authorization before commencing the future/secondary research that was encompassed in the original informed consent. Response: Covered entities and researchers may rely on an Institutional Review Board-approved consent obtained prior to the effective date of this final rule that reasonably informed individuals of the future research, provided the informed consent was combined with a HIPAA authorization (even though the authorization itself was specific to the original study or creation and maintenance of a repository). Comment: One commenter advocated for the use of time-limited authorizations for future research. Response: This modification in Departmental interpretation does not change the requirement at § 164.508(c)(1)(v), which states that an authorization must contain an expiration date or an expiration event that relates to the individual or the purpose of the use or disclosure. This statement may be a specific time limit, or be ‘‘end of the research study,’’ ‘‘none,’’ or similar language for a research study. Comment: Several commenters suggested that revocation of authorizations should continue to be permitted in the same manner that it is currently allowed under the Privacy Rule. The Secretary’s Advisory Committee on Human Research Protections recommended that revocations of authorization for future research be permitted orally, rather than in writing, as is currently required for all authorizations under §§ 164.508(b)(5) and (c)(2)(i) of the Rule. Response: Covered entities may continue to rely on existing guidance regarding how revocations of authorizations operate in the research context. Such guidance is published in several materials available at https:// www.hhs.gov/ocr/privacy/hipaa/ PO 00000 Frm 00049 Fmt 4701 Sfmt 4700 5613 understanding/special/research/ index.html (see, e.g., the fact sheet entitled, ‘‘Health Services Research and the HIPAA Privacy Rule’’). The Department may issue additional guidance in the future with respect to revocation policies in the context of authorizations that specify, and under which protected health information has been disclosed for, future research uses. In response to the Secretary’s Advisory Committee on Human Research Protections recommendation, we also clarify that while the Privacy Rule requires that a revocation of authorization from an individual be in writing, uses and disclosures pursuant to an authorization are permissive and not required, and thus, a covered entity may cease using or disclosing protected health information pursuant to an authorization based on an individual’s oral request if it chooses to do so. 5. Protected Health Information About Decedents a. Section 164.502(f)—Period of Protection for Decedent Information Proposed Rule Section 164.502(f) requires covered entities to protect the privacy of a decedent’s protected health information generally in the same manner and to the same extent that is required for the protected health information of living individuals. Thus, if an authorization is required for a particular use or disclosure of protected health information, a covered entity may use or disclose a decedent’s protected health information in that situation only if the covered entity obtains an authorization from the decedent’s personal representative. The personal representative for a decedent is the executor, administrator, or other person who has authority under applicable law to act on behalf of the decedent or the decedent’s estate. The Department heard a number of concerns since the publication of the Privacy Rule that it can be difficult to locate a personal representative to authorize the use or disclosure of the decedent’s protected health information, particularly after an estate is closed. Furthermore, archivists, biographers, and historians had expressed frustration regarding the lack of access to ancient or old records of historical value held by covered entities, even when there are likely few surviving individuals concerned with the privacy of such information. Archives and libraries may hold medical records, as well as correspondence files, physician diaries and casebooks, and photograph collections containing fragments of E:\FR\FM\25JAR2.SGM 25JAR2 5614 Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations sroberts on DSK5SPTVN1PROD with identifiable health information, that are centuries old. Currently, to the extent such information is maintained by a covered entity, it is subject to the Privacy Rule. Accordingly, we proposed to amend § 164.502(f) to require a covered entity to comply with the requirements of the Privacy Rule with regard to the protected health information of a deceased individual for a period of 50 years following the date of death. We also proposed to modify the definition of ‘‘protected health information’’ at § 160.103 to make clear that the individually identifiable health information of a person who has been deceased for more than 50 years is not protected health information under the Privacy Rule. We proposed 50 years to balance the privacy interests of living relatives or other affected individuals with a relationship to the decedent, with the difficulty of obtaining authorizations from personal representatives as time passes. A 50year period of protection had also been suggested at a National Committee for Vital and Health Statistics (the public advisory committee which advises the Secretary on the implementation of the Administrative Simplification provisions of HIPAA, among other issues) meeting, at which committee members heard testimony from archivists regarding the problems associated with applying the Privacy Rule to very old records. See https:// ncvhs.hhs.gov/050111mn.htm. We requested public comment on the appropriateness of this time period. Overview of Public Comments The majority of public comment on this proposal was in favor of limiting the period of protection for decedent health information to 50 years past the date of death. Some of these commenters specifically cited the potential benefits to research. A few commenters stated that the 50-year period was too long and should be shortened to, for example, 25 years. Some supporters of limiting privacy protection for decedent information indicated that the date of death is often difficult to determine, and thus suggested an alternative time period (e.g., 75, 100, 120, 125 years) starting from the last date in the medical record, if the date of death is unknown. Some commenters were opposed to limiting the period of protection for decedent health information due to the continued privacy interests of living relatives as well as the decedent, particularly when highly sensitive information is involved, including HIV/ AIDS status, or psychiatric or substance VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 abuse treatment. A couple of commenters recommended that there should be no time limit on the protection of psychotherapy notes. One commenter expressed concern that this modification may encourage covered entities to retain records that they would not have otherwise in order to profit from the data after the 50-year period. One commenter suggested that the period of protection should be extended to 100 years, if protections are to be limited at all. A few commenters were opposed to the 50-year period of protection because they interpreted this provision to be a proposed record retention requirement. Final Rule After considering the public comments, the final rule adopts the proposal. We believe 50 years is an appropriate period of protection for decedent health information, taking into account the remaining privacy interests of living individuals after the span of approximately two generations have passed, and the difficulty of obtaining authorizations from a personal representative of a decedent as the same amount of time passes. For the same reason, we decline to shorten the period of protection as suggested by some commenters or to adopt a 100-year period of protection for decedent information. We also believe the 50-year period of protection to be long enough so as not to provide an incentive for covered entities to change their record retention policies in order to profit from the data about a decedent once 50 years has elapsed. With respect to commenters’ concerns regarding protected health information about decedents that is sensitive, such as HIV/AIDS, substance abuse, or mental health information, or that involves psychotherapy notes, we emphasize that the 50-year period of protection for decedent health information under the Privacy Rule does not override or interfere with State or other laws that provide greater protection for such information, or the professional responsibilities of mental health or other providers. Covered entities may continue to provide privacy protections to decedent information beyond the 50-year period, and may be required to do so under other applicable laws or as part of their professional responsibility. Alternatively, covered entities may choose to destroy decedent information although other applicable law may prescribe or limit such destruction. We also decline to limit protections under the Privacy Rule to a certain period beyond the last date in the PO 00000 Frm 00050 Fmt 4701 Sfmt 4700 medical record. While we appreciate the challenges that may be present in determining the date of death of an individual in cases in which it is not sufficiently clear from the age of the record whether the individual is deceased, we believe that this determination is necessary in closer cases to protect the individual, as well as living relatives and others, who may be affected by disclosure of the information. Further, as we stated in the NPRM, this modification has no impact on a covered entity’s disclosures permitted under other provisions of the Privacy Rule. For example, a covered entity is permitted to disclose protected health information of decedents for research that is solely on the information of decedents in accordance with § 164.512(i)(1)(iii), without regard to how long the individual has been deceased. Finally, we clarify that the 50-year period of protection is not a record retention requirement. The HIPAA Privacy Rule does not include medical record retention requirements and covered entities may destroy such records at the time permitted by State or other applicable law. (We note that covered entities are subject to the accounting requirements at § 164.528 and, thus, would need to retain or record certain information regarding their disclosures of protected health information.) However, if a covered entity does maintain decedent health information for longer than 50 years following the date of death of the individual, this information will no longer be subject to the Privacy Rule. b. Section 164.510(b)—Disclosures About a Decedent to Family Members and Others Involved in Care Proposed Rule Section 164.510(b) describes how a covered entity may use or disclose protected health information to persons, such as family members or others, who are involved in an individual’s care or payment related to the individual’s health care. The Department had received a number of questions about the scope of the section, specifically with regard to disclosing protected health information when the individual who is the subject of the information was deceased. We had additionally heard concerns that family members, relatives, and others, many of whom may have had access to the health information of the deceased individual prior to death, have had difficulty obtaining access to such information after the death of the individual, because many do not qualify as a E:\FR\FM\25JAR2.SGM 25JAR2 Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations sroberts on DSK5SPTVN1PROD with ‘‘personal representative’’ of the decedent under the Privacy Rule at § 164.502(g)(4). As such, we proposed to amend § 164.510(b) to add a new paragraph (5), which would permit covered entities to disclose a decedent’s information to family members and others who were involved in the care or payment for care of the decedent prior to death, unless doing so is inconsistent with any prior expressed preference of the individual that is known to the covered entity. We emphasized that these modifications would not change the authority of a decedent’s personal representative with regard to the decedent’s protected health information. Thus, a personal representative would continue to have a right to access the decedent’s protected health information relevant to such personal representation, and have authority to authorize uses and disclosures of the decedent’s protected health information that are not otherwise permitted or required by the Privacy Rule. We requested comment on any unintended consequences that this proposed disclosure provision might cause. Overview of Public Comments Most commenters supported the proposal to permit disclosures to family members and others involved in the care or payment for care of the decedent prior to death, unless doing so is inconsistent with any prior expressed preference of the individual that is known to the covered entity. These commenters felt that such permissive disclosures would help facilitate important and appropriate communications with family members and others who had been involved in the individual’s care or payment for health care prior to the individual’s death but who may not rise to the level of personal representative. Some commenters stated that the provision recognizes the legitimate interest that family members may have in a decedent’s health information as it affects their own health care. A few commenters opposed the proposal to expressly permit communications with family members and other persons who had been involved with the individual’s care or payment for care prior to death. Two commenters felt it would be a large burden on covered entities to determine the legitimacy of a requestor as a family member or individual involved in the care or payment for care. One commenter questioned the need for family members to have access to decedent health information and the likelihood of anyone other than the VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 personal representative to have been meaningfully involved in the care or payment for care of the decedent. Final Rule The final rule adopts the proposal to amend § 164.510(b) to permit covered entities to disclose a decedent’s protected health information to family members and others who were involved in the care or payment for care of the decedent prior to death, unless doing so is inconsistent with any prior expressed preference of the individual that is known to the covered entity. In response to commenters who opposed this provision, we believe the provision strikes the appropriate balance in allowing communications with family members and other persons who were involved in the individual’s care or payment for care prior to death, unless doing so is inconsistent with the prior expressed wishes of the individual. This will ensure family members and others can find out about the circumstances surrounding the death of their loved ones, unless the individual prior to his or her death objected to the covered entity making such communications. Further, the Privacy Rule limits such disclosures, similar to the other disclosures permitted under § 164.510(b), to the protected health information relevant to the family member or other person’s involvement in the individual’s health care or payment for health care. For example, a covered health care provider could describe the circumstances that led to an individual’s passing with the decedent’s sister who is asking about her sibling’s death. In addition, a covered health care provider could disclose billing information to a family member of a decedent who is assisting with wrapping up the decedent’s estate. However, in both of these cases, the provider generally should not share information about past, unrelated medical problems. Finally, these disclosures are permitted and not required, and thus, a covered entity that questions the relationship of the person to the decedent or otherwise believes, based on the circumstances, that disclosure of the decedent’s protected health information would not be appropriate, is not required to make the disclosure. Response to Other Public Comments Comment: Commenters requested guidance on what it means for a person to have been ‘‘involved in the care’’ of the decedent prior to death. One commenter suggested including language in the final rule that would put the burden of proof of ‘‘involvement in PO 00000 Frm 00051 Fmt 4701 Sfmt 4700 5615 the individual’s care’’ on the requestor and not the covered entity, and would hold the covered entity harmless when disclosing decedent information in good faith in accordance with this new permission. Response: We interpret this phrase in the same manner as we have with respect to disclosures of protected health information of living individuals under § 164.510(b). See the Department’s existing guidance at https://www.hhs.gov/ocr/privacy/hipaa/ understanding/coveredentities/ provider_ffg.pdf. Subject to the specified conditions, disclosures may be made under this provision to family members, as well as to other persons provided the covered entity has reasonable assurance the individual prior to death was involved in the individual’s care or payment for care. Depending on the circumstances, this could include disclosures to spouses, parents, children, domestic partners, other relatives, or friends of a decedent. As with similar disclosures concerning living individuals under § 164.510(b)(1)(i), this provision does not generally apply to disclosures to health care providers, health plans, public health authorities, law enforcement officials, and others whose access to protected health information is governed by other provisions of the Privacy Rule. We decline to include language in the final rule placing the burden of proof on the requestor to demonstrate they were involved in the individual’s care. In some cases, it will be readily apparent to the covered entity that a person is a family member or was involved in the individual’s care prior to death because the person would have made themselves known to the covered entity prior to the individual’s death by either visiting with or inquiring about the individual, or the individual would have identified such person as being involved in their care or payment for care to a member of the covered entity’s workforce. In other cases, the covered entity need just have reasonable assurance that the person is a family member of the decedent or other person who was involved in the individual’s care or payment for care prior to death. For example, the person may indicate to the covered entity how he or she is related to the decedent or offer sufficient details about the decedent’s circumstances prior to death to indicate involvement in the decedent’s care prior to death. As stated above, a covered entity that is uncomfortable disclosing protected health information under this provision because of questions about the person’s E:\FR\FM\25JAR2.SGM 25JAR2 5616 Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations relationship to the decedent is not required to do so. Comment: Several commenters requested and offered suggested clarifications on the scope of the terms ‘‘personal representative’’ and ‘‘family member.’’ Response: The Privacy Rule already identifies the persons who qualify as a personal representative of a decedent at § 164.502(g)(4). Further, this final rule includes a definition of ‘‘family member’’ at § 160.103. Comment: A few commenters suggested extending this provision to allow disclosures to the decedent’s health care ‘‘proxy,’’ ‘‘medical power of attorney,’’ ‘‘power of attorney,’’ and ‘‘estate executor.’’ Response: We decline to expand the provision as suggested. Under the Privacy Rule, a person with authority under applicable law to act on behalf of the decedent or the decedent’s estate is the personal representative of the decedent. Thus, certain of these persons, such as the executor of the estate, already have a right of access to the decedent’s protected health information. In cases where a person does not rise to the level of a personal representative, the final rule at § 164.510(b) permits, subject to any prior expressed preference of the individual, a covered entity to disclose relevant protected health information of the decedent to family members of the decedent or persons who otherwise were involved in the individual’s care or payment for care prior to the individual’s death, which may include persons who held a health care proxy for the individual or a medical power of attorney. 6. Section 164.512(b)—Disclosure of Student Immunizations to Schools sroberts on DSK5SPTVN1PROD with Proposed Rule The Privacy Rule, at § 164.512(b), recognizes that covered entities must balance protecting the privacy of health information with sharing health information with those responsible for ensuring public health and safety, and permits covered entities to disclose the minimum necessary protected health information to public health authorities or other designated persons or entities without an authorization for public health purposes specified by the Rule. Schools play an important role in preventing the spread of communicable diseases among students by ensuring that students entering classes have been immunized. Most States have ‘‘school entry laws’’ which prohibit a child from attending school unless the school has proof that the child has been VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 appropriately immunized. Some States allow a child to enter school provisionally for a certain period of time while the school waits for the necessary immunization information. Typically, schools ensure compliance with those requirements by requesting the immunization records from parents (rather than directly from a health care provider). However, where a covered health care provider is requested to send the immunization records directly to a school, the Privacy Rule generally requires written authorization by the child’s parent before a covered health care provider may do so. Since the Privacy Rule went into effect, we had heard concerns that the requirement for covered entities to obtain authorization before disclosing student immunization information may make it more difficult for parents to provide, and for schools to obtain, the necessary immunization documentation for students, which may prevent students’ admittance to school. The National Committee on Vital and Health Statistics submitted these concerns to the HHS Secretary and recommended that HHS regard disclosure of immunization records to schools to be a public health disclosure, thus eliminating the requirement for authorization. See https:// www.ncvhs.hhs.gov/04061712.html. As such, we proposed to amend § 164.512(b)(1) by adding a new paragraph that permits covered entities to disclose proof of immunization to schools in States that have school entry or similar laws.10 While written authorization that complies with § 164.508 would no longer have been required for disclosure of such information under the proposal, the covered entity would still have been required to obtain agreement, which may have been oral, from a parent, guardian or other person acting in loco parentis for the individual, or from the individual him- or herself, if the individual is an adult or emancipated minor. Because the proposed provision would have permitted a provider to 10 We note that once a student’s immunization records are obtained and maintained by an educational institution or agency to which the Family Educational Rights and Privacy Act (FERPA) applies, the records are protected by FERPA, rather than the HIPAA Privacy Rule. See paragraphs (2)(i) and (2)(ii) of the definition of ‘‘protected health information’’ at § 160.103, which exclude from coverage under the Privacy Rule student records protected by FERPA. In addition, for more information on the intersection of FERPA and HIPAA, readers are encouraged to consult the Joint HHS/ED Guidance on the Application of FERPA and HIPAA to Student Health Records, available at https://www.hhs.gov/ocr/privacy/hipaa/ understanding/coveredentities/ hipaaferpajointguide.pdf. PO 00000 Frm 00052 Fmt 4701 Sfmt 4700 accept a parent’s oral agreement to disclose immunization results to a school—as opposed to a written agreement—the NPRM acknowledged a potential for a miscommunication and later objection by the parent. We, therefore, requested comment on whether the Privacy Rule should require that a provider document any oral agreement under this provision to help avoid such problems, or whether a requirement for written documentation would be overly cumbersome, on balance. We also requested comment on whether the rule should mandate that the disclosures go to a particular school official and if so, who that should be. In addition, the Privacy Rule does not define the term ‘‘school’’ and the types of schools subject to the school entry laws may vary by State. For example, depending on the State, such laws may apply to public and private elementary or primary schools and secondary schools (kindergarten through 12th grade), as well as daycare and preschool facilities, and post-secondary institutions. Thus, we requested comment on the scope of the term ‘‘school’’ for the purposes of this section and whether we should include a specific definition of ‘‘school’’ within the regulation itself. In addition, we requested comment on the extent to which schools that may not be subject to these school entry laws but that may also require proof of immunization have experienced problems that would warrant their being included in this category of public health disclosures. Overview of Public Comments Most commenters were generally in favor of permitting covered entities to disclose student immunization records based on obtaining agreement, which may be oral, from a parent, guardian or other person acting in loco parentis for the individual, or from the individual himself or herself, if the individual is an adult or emancipated minor, rather than written authorization. Commenters supported the intent to facilitate the transmission of immunization records to ease the burden on parents, schools and covered entities, and to minimize the amount of school missed by students. Some commenters opposed the proposal to require oral or written agreement, claiming that a new form of ‘‘agreement’’ would introduce unnecessary complexity and confusion, and would not help to reduce burden. These commenters asserted that covered entities would document the verbal agreements for their own liability purposes, even if not required by the Privacy Rule. In this manner, the documentation burden would still be E:\FR\FM\25JAR2.SGM 25JAR2 sroberts on DSK5SPTVN1PROD with Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations present. Some commenters recommended that instead of an oral agreement or authorization requirement, disclosure of immunization records to schools should be considered an exempt public health disclosure. A small minority of commenters felt that the current authorization system should be maintained as it is the best way to ensure patient safety and privacy while avoiding miscommunications and misunderstandings. Commenters were divided on the issue of requiring written documentation of the agreement. Some commenters were in favor of documenting oral agreements, citing that the documentation would be less cumbersome than obtaining written authorizations while also helping to avoid miscommunications. On the other hand, some commenters felt that requiring written documentation would be burdensome and would eliminate the benefits introduced by permitting oral agreements. Some commenters also requested flexibility for covered entities to determine whether or not written documentation is appropriate and necessary for their purposes. The majority of commenters requested that a designated recipient of the student immunization records not be defined, and that schools be allowed flexibility to identify the appropriate individual(s) that can act as the school official permitted to receive the records. Commenters indicated that while the disclosures would ideally be made to a nurse or licensed health professional at the school, such a health professional may not always be present. In such instances, it should be permissible that the immunization records be disclosed to another official designated by the school as a suitable representative. One commenter recommended that the school nurse be designated as the recipient and custodian of the records. Most commenters recommended that the definition of ‘‘school’’ be interpreted broadly in order to best support public health efforts. Commenters provided suggestions on the types of schools that should be included, for example, K–12 schools, public and private schools, and post-secondary schools. Many commenters also suggested that daycare, preschool and nursery school facilities be encompassed in the definition of school. One commenter expressly recommended that child care facilities or day care programs not be included in the definition of school, despite acknowledging the need to protect the health of these children, due to the fact that many States have different laws for these settings and are separate from school systems. Two commenters VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 suggested defining schools as being open to children up to age 18, since students become adults at age 18 and can authorize the disclosure of their own information. A few commenters suggested that the definition include all schools that require immunization documentation as a prerequisite to enrollment, not just those that are subject to State entry laws, in order to protect public health in all school settings, since the threat of unimmunized children exists regardless of State school entry laws. Additionally, some commenters recommended that the term ‘‘school’’ not be defined in the Privacy Rule due to the variation across States in the types of schools that are subject to the entry laws. Final Rule The final rule adopts the proposal to amend § 164.512(b)(1) by adding a new paragraph that permits a covered entity to disclose proof of immunization to a school where State or other law requires the school to have such information prior to admitting the student. While written authorization will no longer be required to permit this disclosure, covered entities will still be required to obtain agreement, which may be oral, from a parent, guardian or other person acting in loco parentis for the individual, or from the individual himself or herself, if the individual is an adult or emancipated minor. We believe that the option to provide oral agreement for the disclosure of student immunization records will relieve burden on parents, schools, and covered entities, and greatly facilitate the role that schools play in public health, while still giving parents the opportunity to consider whether to agree to the disclosure of this information. The final rule additionally requires that covered entities document the agreement obtained under this provision. The final rule does not prescribe the nature of the documentation and does not require signature by the parent, allowing covered entities the flexibility to determine what is appropriate for their purposes. The documentation must only make clear that agreement was obtained as permitted under this provision. For example, if a parent or guardian submits a written or email request to a covered entity to disclose his or her child’s immunization records to the child’s school, a copy of the request would suffice as documentation of the agreement. Likewise, if a parent or guardian calls the covered entity and requests over the phone that his or her child’s immunization records be disclosed to the child’s school, a PO 00000 Frm 00053 Fmt 4701 Sfmt 4700 5617 notation in the child’s medical record or elsewhere of the phone call would suffice as documentation of the agreement. We emphasize that the agreement is not equivalent to a HIPAAcompliant authorization, and covered entities are not required to document a signature as part of this requirement. We disagree with comments that documentation would be as burdensome on covered entities as written authorization, since an authorization form contains many required statements and elements, including a signature by the appropriate individual, which are not required for the agreement and documentation contemplated here. Furthermore, we believe that documentation of oral agreements will help to prevent miscommunications and potential future objections by parents or individuals, and the concerns that covered entities may have regarding liability, penalty or other enforcement actions for disclosures made pursuant to an oral agreement. Several commenters recommended that in lieu of an oral agreement, disclosure of immunization records to schools are presumed to be permitted, while giving individuals the option to opt out of this presumption or request a restriction to the disclosure. One commenter advocated for this public health exemption for disclosure of immunization records as being particularly critical for children who may be, for example, homeless, living with someone other than a parent or legal guardian, or living with a parent that does not speak English. We remove the written authorization requirement to help facilitate these disclosures with as much flexibility as possible. However, we do not intend this provision to change the current practice of parents, guardians, or other persons acting in loco parentis contacting a child’s health care provider to request proof of immunization be sent to the child’s school. Therefore, we still require active agreement from the appropriate individual, and a health care provider may not disclose immunization records to a school under this provision without such agreement. The agreement must be an affirmative assent or request by a parent, guardian, or other person acting in loco parentis (or by an adult individual or emancipated minor, if applicable) to the covered entity, which may be oral and over the phone, to allow the disclosure of the immunization records. A mere request by a school to a health care provider for the immunization records of a student would not be sufficient to permit disclosure under this provision (and E:\FR\FM\25JAR2.SGM 25JAR2 5618 Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations sroberts on DSK5SPTVN1PROD with such a request by a school might also raise implications under other laws, such as FERPA). We decline to include definitions of ‘‘school official’’ and ‘‘school’’ in the final rule. The motivation for this new permissive disclosure is to promote public health by reducing the burden associated with providing schools with student immunization records and we do not wish to create additional difficulties or confusion in doing so. We therefore agree with commenters that schools are best equipped to determine the appropriate individual to receive student immunization records at their location and will benefit from having this flexibility. We also agree with commenters that ‘‘school’’ should remain undefined in the Privacy Rule due to the variation across States in the types of schools that are subject to the entry laws. We believe that this will best align with State law and cause the least amount of confusion. We did not receive sufficient comment regarding the breadth of schools that are not subject to school entry laws or the burden that these institutions face to justify expanding this provision to allow disclosure of proof of immunization to such schools without an authorization. Response to Other Public Comments Comment: Several commenters raised concerns about the dynamic between the Privacy Rule requirements and State law requirements regarding immunization disclosures. Commenters indicated that some State laws require providers to directly share immunization records with schools and provide parents with the opportunity to opt out of this direct sharing. Commenters also indicated the use of State immunization registries in many States, to which schools are permitted direct access. One commenter suggested that the Privacy Rule permit State law to determine what is the minimum necessary for proof of immunization. Response: We take this opportunity to clarify that the Privacy Rule at § 164.512(a) permits a covered entity to use or disclose protected health information to the extent that such use or disclosure is required by law and the use or disclosure complies with and is limited to the relevant requirements of such law. As such, the Privacy Rule does not prohibit immunization disclosures that are mandated by State law, nor does it require authorization for such disclosures. With regard to State laws that require covered entities to disclose immunization records to schools and allow parents to opt out, this is not in any way prohibited by the Privacy Rule. However, with regard to VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 State laws that permit but do not require covered entities to disclose immunization records to schools, this does not meet the requirements of the provisions at § 164.512(a), and disclosures of immunization records are subject to the Privacy Rule agreement and documentation requirements described in this part. We also note that the Privacy Rule at § 164.512(b) permits a covered entity to disclose protected health information for public health activities. Disclosures of protected health information to State immunization registries are therefore permitted by the Privacy Rule and also do not require authorization. The Privacy Rule at § 164.514(d)(3)(iii)(A) provides that a covered entity, when making a permitted disclosure pursuant to § 164.512 to a public official, may determine, if such a determination is reasonable under the circumstances, that information requested by a public official is the minimum necessary information for the stated purpose, if the public official represents that the information requested is the minimum necessary for the stated purpose(s). Under this provision, a covered entity may rely on State law or a State official’s determination of the minimum necessary information required for proof of immunization, unless such determination is unreasonable. Comment: Commenters requested guidance on when and how often to obtain agreement for immunization disclosures. Response: We anticipate that covered entities will obtain agreement for the disclosure of immunization records on a case-by-case basis as needed. For example, a parent may call and request that a covered entity provide his or her child’s immunization records before the child begins elementary school, if required by State school entry laws. If that child moves to a different school and is unable to transfer their immunization records to the new school, the parent may need to request that the covered entity provide his or her child’s immunization records to the new school, if required by State school entry laws. A parent might also generally indicate to a covered entity that he or she affirmatively agrees to the immediate or future disclosure of his or her child’s immunization records to the child’s school as necessary, or the continued disclosure of such information if, for example, updates are required by the school when a series of vaccinations have been completed. Comment: Commenters requested clarification on the length of time an agreement may be relied upon. PO 00000 Frm 00054 Fmt 4701 Sfmt 4700 Response: An agreement to permit the disclosure of immunization records is considered effective until revoked by the parent, guardian or other person acting in loco parentis for the individual, or by the individual himself or herself, if the individual is an adult or emancipated minor. Comment: Commenters requested clarification regarding any requirement for schools to maintain the immunization records. Response: The Privacy Rule does not require schools to keep student immunization records; however individual State or other laws may require this. 7. Section 164.514(f)—Fundraising Proposed Rule Section 164.514(f)(1) of the Privacy Rule permits a covered entity to use, or disclose to a business associate or an institutionally related foundation, the following protected health information about an individual for the covered entity’s fundraising from that individual without the individual’s authorization: (1) Demographic information relating to an individual; and (2) the dates of health care provided to an individual. Section 164.514(f)(2) of the Privacy Rule requires a covered entity that plans to use or disclose protected health information for fundraising under this paragraph to inform individuals in its notice of privacy practices that it may contact them to raise funds for the covered entity. In addition, § 164.514(f)(2) requires that a covered entity include in any fundraising materials it sends to an individual a description of how the individual may opt out of receiving future fundraising communications and that a covered entity must make reasonable efforts to ensure that individuals who do opt out are not sent future fundraising communications. Section 13406(b) of the HITECH Act requires the Secretary to provide by rule that a covered entity provide the recipient of any fundraising communication with a clear and conspicuous opportunity to opt out of receiving any further fundraising communications. Additionally, section 13406(b) states that if an individual does opt out of receiving further fundraising communications, the individual’s choice to opt out must be treated as a revocation of authorization under § 164.508 of the Privacy Rule. In the NPRM, we proposed a number of changes to the Privacy Rule’s fundraising requirements to implement the statutory provisions. First, we proposed to strengthen the opt out by E:\FR\FM\25JAR2.SGM 25JAR2 sroberts on DSK5SPTVN1PROD with Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations requiring that a covered entity provide, with each fundraising communication sent to an individual under these provisions, a clear and conspicuous opportunity for the individual to elect not to receive further fundraising communications. To satisfy this requirement, we also proposed to require that the method for an individual to elect not to receive further fundraising communications may not cause the individual to incur an undue burden or more than nominal cost. We encouraged covered entities to consider the use of a toll-free phone number, an email address, or similar opt out mechanism that would provide individuals with a simple, quick, and inexpensive way to opt out of receiving future communications. We noted that we considered requiring individuals to write a letter to opt out to constitute an undue burden on the individual. We also proposed to provide that a covered entity may not condition treatment or payment on an individual’s choice with respect to receiving fundraising communications. We believed this modification would implement the language in section 13406(b) of the HITECH Act that provides that an election by an individual not to receive further fundraising communications shall be treated as a revocation of authorization under the Privacy Rule. Further, we proposed to provide that a covered entity may not send fundraising communications to an individual who has elected not to receive such communications. This would strengthen the current requirement at § 164.514(f)(2)(iii) that a covered entity make ‘‘reasonable efforts’’ to ensure that those individuals who have opted out of receiving fundraising communications are not sent such communications. The NPRM proposed stronger language to make clear the expectation that covered entities abide by an individual’s decision not to receive fundraising communications, as well as to make the fundraising opt out operate more like a revocation of authorization, consistent with the statutory language and legislative history of section 13406(b) of the HITECH Act discussed above. With respect to the operation of the opt out, we requested comment regarding to what fundraising communications the opt out should apply (i.e., should the opt out apply to all future fundraising communications or should and can the opt out be structured in a way to apply only to the particular fundraising campaign described in the letter). We also requested comment on whether the Rule VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 should allow a similar method, short of the individual signing an authorization, by which an individual who has previously opted out can put his or her name back on an institution’s fundraising list. We proposed to retain the requirement that a covered entity that intends to contact the individual to raise funds under these provisions include a statement to that effect in its notice of privacy practices. However, we proposed that the required statement also inform individuals that they have a right to opt out of receiving such communications. In addition to the above modifications, we requested public comment on the requirement at § 164.514(f)(1) which limits the information a covered entity may use or disclose for fundraising to demographic information about and dates of health care service provided to an individual. Since the promulgation of the Privacy Rule, we acknowledged that certain covered entities have raised concerns regarding this limitation, maintaining that the Privacy Rule’s prohibition on the use or disclosure of certain treatment information without an authorization, such as the department of service where care was received and outcomes information, impedes their ability to raise funds from often willing and grateful patients because they are unable to target their fundraising efforts and avoid inappropriate solicitations to individuals who may have had a bad treatment outcome. Such entities have argued that obtaining an individual’s authorization for fundraising as the individual enters or leaves the hospital for treatment is often impracticable or inappropriate. The proposed rule also discussed the fact that the National Committee on Vital and Health Statistics held a hearing and heard public testimony on this issue in July 2004 and recommended to the Secretary that the Privacy Rule should allow covered entities to use or disclose information related to the patient’s department of service (broad designations, such as surgery or oncology, but not narrower designations or information relating to diagnosis or treating physician) for fundraising activities without patient authorization. The National Committee on Vital and Health Statistics also recommended that a covered entity’s notice of privacy practices inform patients that their department of service information may be used in fundraising, and that patients should be afforded the opportunity to opt out of the use of their department of service information for fundraising or all fundraising contacts altogether. See PO 00000 Frm 00055 Fmt 4701 Sfmt 4700 5619 https://www.ncvhs.hhs.gov/ 040902lt1.htm. In light of these concerns and the prior recommendation of the National Committee on Vital and Health Statistics, we asked for public comment on whether and how the current restriction on what information may be used and disclosed should be modified to allow covered entities to more effectively target fundraising and avoid inappropriate solicitations to individuals, as well as to reduce the need to send solicitations to all patients. In particular, we solicited comment on: (1) Whether the Privacy Rule should allow additional categories of protected health information to be used or disclosed for fundraising, such as department of service or similar information, and if so, what those categories should be; (2) the adequacy of the minimum necessary standard to appropriately limit the amount of protected health information that may be used or disclosed for fundraising purposes; or (3) whether the current limitation should remain unchanged. We also solicited comment on whether, if additional information is permitted to be used or disclosed for fundraising absent an authorization, covered entities should be required to provide individuals with an opportunity to opt out of receiving any fundraising communications before making the first fundraising solicitation, in addition to the opportunity to opt out with every subsequent communication. We invited public comment on whether such a presolicitation opt out would be workable for covered entities and individuals and what mechanisms could be put into place to implement the requirement. Overview of Public Comments In general, the public comments received in response to the NPRM were supportive of the proposed modifications but many asked that the final rule give covered entities flexibility with respect to operationalizing these requirements. Several commenters provided examples of routine communications and expressed the need for guidance and clarification about what constitutes a fundraising communication. Generally, most commenters supported the NPRM’s proposed requirement that the method through which the covered entity permits individuals to opt out of receiving future fundraising communications not cause individuals to incur an undue burden or more than a nominal cost. Many commenters stated that the final rule should give covered entities the flexibility to determine which opt out E:\FR\FM\25JAR2.SGM 25JAR2 sroberts on DSK5SPTVN1PROD with 5620 Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations methods will work best given their circumstances, instead of requiring all covered entities to employ specific opt out methods. These commenters noted that depending on the size of the covered entity and type of population it serves, certain opt out methods might not be feasible, such as one that requires the establishment of a toll-free number, which may be cost prohibitive for some small entities. Similarly, some commenters noted that because not all individuals have access to a computer and the Internet, providing individuals with the opportunity to opt out via email alone may not be sufficient. With respect to the scope of the opt out, the commenters were generally split on whether the opt out should apply to communications related to a specific fundraising campaign or to all future fundraising communications. The commenters in support of applying the opt out to a specific fundraising campaign stated that it would be too difficult for individuals to make a meaningful decision about whether they wanted to opt out of all future fundraising communications, and allowing individuals to opt out of all futurefundraising communications would greatly hinder a covered entity’s ability to raise funds. Those commenters in favor of implementing an all or nothing opt out stated that it would be too difficult for covered entities, especially large facilities, to track campaign-specific opt outs for each individual, so applying the opt out universally would make it much easier for covered entities to implement. Other commenters asked that the final rule take a flexible approach and permit covered entities to decide the scope of the opt out, while others stated that the final rule should require covered entities to include both opt out options on each fundraising communication leaving the decision to individuals. Additionally, while most commenters supported the prohibition on conditioning treatment or payment on an individual’s choice regarding the receipt of fundraising communications, most commenters opposed the NPRM’s proposal that prohibited covered entities from sending future fundraising communications to those individuals who had opted out and stated that it was too strict. The majority of these commenters suggested that the final rule retain the Privacy Rule’s original ‘‘reasonable efforts’’ language and stated that while covered entities have every incentive not to send fundraising communications to those individuals who have opted out of receiving them, it is very difficult for covered entities to ensure 100 percent accuracy with this VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 policy. Several commenters stated that there are lag times between the period of time in which a fundraising mailing list is compiled and the time in which a fundraising communication is sent out, so if an individual has opted out during the interim time period, covered entities may not be able to prevent the prepared fundraising communication from being sent. Other commenters stated that it may be difficult to implement an opt out across all records belonging to that individual where complications, such as name changes and variation, address changes, and multiple addresses are involved. For those individuals who have opted out of receiving fundraising communications, commenters generally supported allowing those individuals to opt back in to receiving such communications. Some suggested that individuals be able to opt back in using the same methods they used to opt out, while others suggested that any communication indicating a willingness to resume receiving fundraising communications, such as making a donation to the covered entity, should function as an opt in. Other commenters suggested that the final rule limit the amount of time that an individual can opt out, such that after this period of time the individual automatically begins receiving fundraising communications again. A few commenters were opposed to permitting individuals to opt back in to receive fundraising communications, stating that this would be too costly and burdensome for covered entities to track. With respect to the requests for public comments regarding the potential use or disclosure of additional protected health information to provide more targeted fundraising communications, the vast majority of commenters supported allowing the use or disclosure of additional protected health information for fundraising. These commenters stated that the use of additional protected health information would streamline their fundraising efforts and ensure that individuals were sent communications about campaigns that would be meaningful to their experiences. These commenters also stated that it would eliminate the concern of sending a communication to an individual or family that suffered a negative outcome. Commenters suggested several categories of protected health information that covered entities should be able to use to target their fundraising efforts, including department or site of service, generic area of treatment, department where last seen, outcome information, treating physician, diagnosis, whether the PO 00000 Frm 00056 Fmt 4701 Sfmt 4700 individual was a pediatric or adult patient, medical record number, Social Security number, or other unique identifier, and any other information that reflects the fact that the individual was served by the covered entity. With respect to the minimum necessary standard, a few commenters supported its use to limit any additional categories of protected health information that can be used to target a covered entity’s fundraising efforts. These commenters supported the use of the standard because of how familiar and comfortable most covered entities are at applying the minimum necessary standard. However, another commenter was opposed to the use of the minimum necessary standard, stating that it is not uniformly applied across covered entities. Despite the general support for the use of additional protected health information, a small minority of commenters opposed allowing the use of additional protected health information to target fundraising efforts, citing privacy concerns with doing so. One commenter opposed expanding the information that could be used for fundraising in cases where outside fundraising entities are used, including those with whom the covered entity has executed business associate agreements. All commenters were opposed to requiring covered entities to provide a pre-solicitation opt out to individuals and stated that permitting individuals to opt out in the first fundraising communication is sufficient. Several commenters noted that the proposed revision to the notice of privacy practices to require a covered entity to inform individuals of their right to opt out of receiving fundraising communications effectively functions as a pre-solicitation opt out, so individuals who wish to opt out of receiving such communications immediately can do so upon receipt of the notice. Final Rule We generally adopt the proposals in the final rule, as well as allow certain additional types of protected health information to be used or disclosed for fundraising purposes. With respect to the commenters who expressed confusion over what constitutes a fundraising communication, we emphasize that the final rule does nothing to modify the types of communications that are currently considered to be for fundraising purposes. A communication to an individual that is made by a covered entity, an institutionally related foundation, or a business associate on behalf of the covered entity for the E:\FR\FM\25JAR2.SGM 25JAR2 sroberts on DSK5SPTVN1PROD with Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations purpose of raising funds for the covered entity is a fundraising communication for purposes of § 164.514(f). The Department has stated that ‘‘[p]ermissible fundraising activities include appeals for money, sponsorship of events, etc. They do not include royalties or remittances for the sale of products of third parties (except auctions, rummage sales, etc.).’’ See 65 FR 82718. Additionally, the Privacy Rule has always required that such communications contain a description of how the individual may opt out of receiving further fundraising communications (§ 164.514(f)(2)(ii)). With respect to the proposed requirement that the method for an individual to elect not to receive further fundraising communications should not cause the individual to incur an undue burden or more than a nominal cost, we generally agree with the commenters who suggested that the final rule be flexible and not prescriptive. Under the final rule, covered entities are free to decide what methods individuals can use to opt out of receiving further fundraising communications, as long as the chosen methods do not impose an undue burden or more than a nominal cost on individuals. Covered entities should consider the use of a toll-free phone number, an email address, or similar opt out mechanisms that provide individuals with simple, quick, and inexpensive ways to opt out of receiving further fundraising communications. Covered entities may employ multiple opt out methods, allowing individuals to determine which opt out method is the simplest and most convenient for them, or a single method that is reasonably accessible to all individuals wishing to opt out. In response to commenters who expressed concern about the cost of setting up a toll-free phone number, we clarify that covered entities may require individuals who wish to opt out of further fundraising communications to do so through other methods, (e.g., through the use of a local phone number), where appropriate, as long as the method or methods adopted do not impose an undue burden or cost on the individual. We encourage covered entities to consider the size of the population to which they are sending the communications, the geographic distribution, and any other factors that may help determine which opt out method(s) is most appropriate and least burdensome to individuals. We continue to consider requiring individuals to write and send a letter to the covered entity asking not to receive further fundraising communications to constitute an undue burden. However, VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 requiring that individuals opt out of further fundraising communications by simply mailing a pre-printed, pre-paid postcard would not constitute an undue burden under the final rule and is an appropriate alternative to the use of a phone number or email address. Regarding the scope of the opt out, the commenters were split on whether the opt out should apply to all future fundraising communications or to a specific fundraising campaign. The final rule leaves the scope of the opt out to the discretion of covered entities. For those covered entities that expressed concern about the ability to track campaign-specific opt outs, they have the discretion to apply the opt out to all future fundraising communications. Likewise, those covered entities that prefer, and have the ability to track, campaign-specific opt outs are free to apply the opt out to specific fundraising campaigns only. Covered entities are also free to provide individuals with the choice of opting out of all future fundraising communications or just campaign-specific communications. Whatever method is employed, the communication should clearly inform individuals of their options and any consequences of electing to opt out of further fundraising communications. Despite the commenters who did not support the strengthened language in the NPRM prohibiting covered entities from sending further fundraising communications to those individuals who have already opted out, the final rule adopts this provision without modification. While many commenters supported the current ‘‘reasonable efforts’’ standard and cited several reasons that may make it difficult to attain the proposed standard, we adopt the proposed standard because it is consistent with the statute and more protective of an individual’s right to elect not to receive further fundraising communications. For example, some commenters cited lag times between the creation of mailing lists and the receipt or update of opt out lists and difficulty in accurately identifying individuals on the fundraising lists due to name changes or variations and multiple addresses. These issues are common to the management of the medical or billing records and effectuating revocations of authorization, requests for access, and other general communications between the entity and the individual. We expect the same care and attention to the handling of protected health information in fundraising communications as is necessary for the proper handling of this information in all other health care operations performed by the covered PO 00000 Frm 00057 Fmt 4701 Sfmt 4700 5621 entity. Covered entities voluntarily choosing to send fundraising communications to individuals must have data management systems and processes in place to timely track and flag those individuals who have opted out of receiving fundraising communications to ensure that they are not sent additional fundraising communications. The majority of commenters supported allowing a process for individuals who have opted out of receiving further fundraising communications to opt back in and the final rule at § 164.514(f)(2)(v) permits covered entities have one. Like the discretion given to covered entities regarding the methods through which an individual can opt out, the final rule gives covered entities the discretion to determine how individuals should be able to opt back in. For example, a covered entity could include as a part of a routine newsletter sent to all patients a phone number individuals can call to be put on a fundraising list. While some commenters suggested that opt outs should be time limited such that an individual automatically opts back in after a certain period of time, we do not believe that an individual’s election not to receive further fundraising communications is something that should automatically lapse. Because the individual has actively chosen to opt out, only a similar active decision by the individual to opt back in will suffice. Additionally, where an individual who has opted out of fundraising communications makes a donation to a covered entity, it does not serve, absent a separate election to opt back in, to automatically add the individual back onto the mailing list for fundraising communications. The Privacy Rule currently permits covered entities to use or disclose only demographic information relating to the individual and dates of health care provided to the individual for fundraising communications. In response to several commenters who asked for clarification regarding the scope of demographic information, the final rule, at § 164.514(f)(1)(i), clarifies that demographic information relating to an individual includes names, addresses, other contact information, age, gender, and dates of birth. Although much of this information was listed in the preamble to the 2000 final rule (65 FR 82718) as being demographic information with respect to the fundraising provisions, we have added this information to the regulatory text for clarity. Additionally, we have included date of birth as demographic information, instead of merely age. We E:\FR\FM\25JAR2.SGM 25JAR2 sroberts on DSK5SPTVN1PROD with 5622 Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations believe that date of birth may be useful to covered entities because they are more likely to maintain a record of an individual’s date of birth, rather than his or her static age. We also note that the 2000 preamble identifies insurance status as falling within the category of demographic information. The final rule continues to allow covered entities to use or disclose information about an individual’s health insurance status for fundraising purposes; however, we list this category of information separately in the regulatory text, as we do not believe this information truly constitutes demographic information. In addition to demographic information, health insurance status, and dates of health care provided to the individual (which is currently permitted under the Rule), this final rule also allows covered entities to use and disclose department of service information, treating physician information, and outcome information for fundraising purposes. These three categories of information were most frequently identified by commenters as the most needed for covered entities to further target fundraising communications to appropriate individuals. Although we do not define these terms, we clarify that department of service information includes information about the general department of treatment, such as cardiology, oncology, or pediatrics. Additionally, we clarify that outcome information includes information regarding the death of the patient or any sub-optimal result of treatment or services. In permitting its use for fundraising purposes, we intend for it to be used by the covered entity itself to screen and eliminate from fundraising solicitations those individuals experiencing a sub-optimum outcome, and for its disclosure to a business associate or institutionally related foundation only where such screening function is done by those parties. We also emphasize that as with any use or disclosure under the Privacy Rule, a covered entity must apply the minimum necessary standard at § 164.502(b) to ensure that only the minimum amount of protected health information necessary to accomplish the intended purpose is used or disclosed. We adopt in the final rule the provision prohibiting the conditioning of treatment or payment on an individual’s choice with respect to the receipt of fundraising communications. We also adopt at § 164.520(b)(1)(iii)(A) the requirement that the notice of privacy practices inform individuals that a covered entity may contact them to raise funds for the covered entity and VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 an individual has a right to opt out of receiving such communications. The final rule does not require covered entities to send pre-solicitation opt outs to individuals prior to the first fundraising communication. We believe that because the individual will be on notice of the opportunity to opt out of receiving fundraising communications through the notice of privacy practices and the first fundraising communication itself will contain a clear and conspicuous opportunity to opt out, there is no need to require covered entities to incur the additional burden and cost of sending pre-solicitation opt outs. Under the Privacy Rule fundraising communications can take many forms, including communications made over the phone. Despite the fact that the HITECH Act refers only to written fundraising communications, because the Privacy Rule applies to communications made over the phone, we believe it would be counterintuitive to apply the strengthened opt out requirement to only written fundraising communications. Therefore, like fundraising communications made in writing, covered entities that make fundraising communications over the phone must clearly inform individuals that they have a right to opt out of further solicitations. Accordingly, to make clear that the opt out requirement applies to fundraising solicitations made over the phone, the final rule provides that the opt out requirement applies to each fundraising communication ‘‘made’’ rather than ‘‘sent’’ to an individual. We also emphasize that the notice and opt out requirements for fundraising communications apply only where the covered entity is using or disclosing protected health information to target the fundraising communication. If the covered entity does not use protected health information to send fundraising materials, then the notice and opt out requirements do not apply. For example, if a covered entity uses a public directory to mail fundraising communications to all residents in a particular geographic service area, the notice and opt out requirements are not applicable. Response to Other Public Comments Comment: A few commenters suggested that, to better protect an individual’s privacy, particularly where sensitive health information may be used to target solicitations, the final rule should require an opt in process rather than an opt out process for consenting to fundraising communications. PO 00000 Frm 00058 Fmt 4701 Sfmt 4700 Response: We decline to require an opt in process. The HITECH Act did not replace the right to opt out of fundraising communications with an opt in process. Further, we continue to believe that the opt out process, particularly as it has been strengthened by the HITECH Act and this final rule, provides individuals with appropriate control over the use of their information for these purposes. Comment: One commenter asked that if an individual opts out of receiving further fundraising communications through a mailed communication, must the covered entity also remove the individual’s name from the list through which the covered entity sends email fundraising communications, or must the individual opt out of receiving such email communications separately. Response: A covered entity may choose to provide individuals with the opportunity to select their preferred method for receiving fundraising communications. If an individual elects to opt out of future fundraising communications, then the opt out is effective for all forms of fundraising communications. Thus, the individual must be removed from all such lists. 8. Section 164.520—Notice of Privacy Practices for Protected Health Information Proposed Rule Section 164.520 of the Privacy Rule sets out the requirements for most covered entities to have and distribute a notice of privacy practices (NPP). The NPP must describe the uses and disclosures of protected health information a covered entity is permitted to make, the covered entity’s legal duties and privacy practices with respect to protected health information, and the individual’s rights concerning protected health information. Section 164.520(b)(1)(ii) requires a covered entity to include separate statements about permitted uses and disclosures that the covered entity intends to make, including uses and disclosures for certain treatment, payment, or health care operations purposes. Further, § 164.520(b)(1)(ii)(E) currently requires that the NPP contain a statement that any uses and disclosures other than those permitted by the Privacy Rule will be made only with the written authorization of the individual, and that the individual has the right to revoke an authorization pursuant to § 164.508(b)(5). We proposed to amend § 164.520(b)(1)(ii)(E) to require that the NPP describe the uses and disclosures of protected health information that E:\FR\FM\25JAR2.SGM 25JAR2 sroberts on DSK5SPTVN1PROD with Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations require an authorization under § 164.508(a)(2) through (a)(4) (i.e., including a statement that most uses and disclosures of psychotherapy notes and of protected health information for marketing purposes and the sale of protected health information require an authorization), and provide that other uses and disclosures not described in the notice will be made only with the individual’s authorization. Section 164.520(b)(1)(iii) requires a covered entity to include in its NPP separate statements about certain activities if the covered entity intends to engage in any of the activities. In particular, § 164.520(b)(1)(iii) requires a separate statement in the notice if the covered entity intends to contact the individual to provide appointment reminders or information about treatment alternatives or other healthrelated benefits or services; to contact the individual to fundraise for the covered entity; or, with respect to a group health plan, to disclose protected health information to the plan sponsor. First, with respect to this provision, the NPRM proposed to modify § 164.520(b)(1)(iii)(A) to align the required statement with the proposed modifications related to marketing and subsidized treatment communications. The provision would have required a covered health care provider that intends to send treatment communications to individuals and has received financial remuneration in exchange for making the communication to, in its NPP, notify individuals of this intention and to inform them that they can opt out of receiving such communications. Second, at § 164.520(b)(1)(iii)(B) we proposed to require that if a covered entity intends to contact the individual to raise funds for the entity as permitted under § 164.514(f)(1), the covered entity must not only inform the individual in the NPP of this intention but also must inform the individual that he or she has the right to opt out of receiving such communications. Section 164.520(b)(1)(iv) requires that the NPP contain statements regarding the rights of individuals with respect to their protected health information and a brief description of how individuals may exercise such rights. Section 164.520(b)(1)(iv)(A) currently requires a statement and a brief description addressing an individual’s right to request restrictions on the uses and disclosures of protected health information pursuant to § 164.522(a), including the fact that the covered entity is not required to agree to this request. VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 The NPRM proposed to modify § 164.520(b)(1)(iv)(A) to require a statement explaining that the covered entity is required to agree to a request to restrict disclosure of protected health information to a health plan if the disclosure is for payment or health care operations and pertains to a health care item or service for which the individual has paid out of pocket in full, as provided at § 164.522(a)(1)(vi). Under Subpart D of Part 164, covered entities now have new breach notification obligations. We requested comment on whether the Privacy Rule should require a specific statement regarding this new legal duty and what particular aspects of this new duty would be important for individuals to be notified of in the NPP. The NPRM stated that modifications to § 164.520 would represent material changes to covered entities’ NPPs. Section 164.520(b)(3) requires that when there is a material change to the NPP, covered entities must promptly revise and distribute the NPP as outlined at § 164.520(c). Section 164.520(c)(1)(i)(C) requires that health plans provide notice to individuals covered by the plan within 60 days of any material revision to the NPP. Because we acknowledged that revising and redistributing a NPP may be costly for health plans, we requested comment on ways to inform individuals of this change to privacy practices without unduly burdening health plans. We requested comment on options for informing individuals in a timely manner of this proposed or other material changes to the NPP. We also requested comment on this issue in the proposed changes to the Privacy Rule pursuant to the Genetic Information Nondiscrimination Act (GINA), as discussed below in Section VI. In particular, the Department requested comment on the following options: (1) Replace the 60-day requirement with a requirement for health plans to revise their NPPs and redistribute them (or at least notify members of the material change to the NPP and how to obtain the revised NPP) in their next annual mailing to members after a material revision to the NPP, such as at the beginning of the plan year or during the open enrollment period; (2) provide a specified delay or extension of the 60day timeframe for health plans (3) retain the provision generally to require health plans to provide notice within 60 days of a material revision but provide that the Secretary will waive the 60-day timeframe in cases where the timing or substance of modifications to the Privacy Rule call for such a waiver; or (4) make no change and thus, require that health plans that perform PO 00000 Frm 00059 Fmt 4701 Sfmt 4700 5623 underwriting provide notice to individuals within 60 days of the material change to the NPP that would be required by this proposed rule. The Department requested comment on these options, as well as any other options for informing individuals in a timely manner of material changes to the NPP. Section 164.520(c)(2)(iv) requires that when a health care provider with a direct treatment relationship with an individual revises the NPP, the health care provider must make the NPP available upon request on or after the effective date of the revision and must comply with the requirements of § 164.520(c)(2)(iii) to have the NPP available at the delivery site and to post the notice in a clear and prominent location. We did not propose changes to these provisions because we did not believe these requirements to be overly burdensome but we requested comment on the issue. Overview of Public Comments We received several comments expressing support for the proposed requirement that the NPP include a statement about the uses and disclosures that require authorization. However, other commenters opposed this requirement, arguing that because not all uses and disclosures will apply to every individual, the statement will cause confusion and unnecessary concern. Additionally, these commenters argued that the cost of listing all of the situations requiring authorization would be significant. We received several comments in support of the proposed requirement that the NPP include a specific statement about authorization for uses and disclosures of psychotherapy notes. Some of these commenters requested that the final rule require covered providers to describe in their NPPs their recordkeeping practices with regard to psychotherapy notes and how those practices affect what information can be used and disclosed. Several commenters argued that only covered entities that record psychotherapy notes should be required to include a statement about the authorization requirement for psychotherapy notes in their NPPs. We also received several comments expressing concern regarding the proposed requirement to include information in the NPP about the individual’s right to opt out of receiving certain communications. These commenters argued that information notifying individuals that they could opt out of receiving further subsidized treatment or fundraising communications would provide little E:\FR\FM\25JAR2.SGM 25JAR2 sroberts on DSK5SPTVN1PROD with 5624 Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations value to individuals at a significant cost to covered entities. These commenters felt that including this information would be unnecessary because all subsidized treatment and fundraising communications themselves will include an opt-out mechanism, and as such, including the information in the NPP may cause unnecessary concern for consumers. We received one comment in support of the requirement to include in the NPP a statement about an individual’s right to restrict certain uses and disclosures of protected health information if the individual pays for treatment or services out-of-pocket in full. We also received one comment suggesting that only health care providers should be required to include such a statement in their NPP. We received a number of comments supporting a requirement to include a statement in the NPP about the right to be notified following a breach of unsecured protected health information. One commenter suggested that explaining breach notification requirements in the NPP would help entities handle customer service issues that arise when customers become upset upon receipt of such a breach notification. However, a number of other commenters expressed opposition to this proposal due to concern that such a statement would cause unnecessary concern and fear among individuals who may believe that covered entities cannot appropriately secure their protected health information. Finally, we received one comment requesting that HHS specify the required elements of a breach notification statement for a NPP. We also received several comments arguing that the proposed changes should not constitute material changes to privacy practices requiring a new NPP, particularly where covered entities have already revised their NPPs to comply with the HITECH Act or State law requirements. Two additional commenters argued that each covered entity should determine whether a change is material or not, depending on its existing privacy practices. We received a number of comments regarding the appropriate timing and manner for distributing new NPPs. The majority of the comments received generally fell into three categories: (1) Support for a requirement to revise and distribute notices within 60 days of a material change; (2) a recommendation for HHS to require that covered entities promptly post a revised NPP on their Web site in conjunction with a requirement to send a notice of the change by mail within a specified VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 period; and (3) a request for HHS to extend the compliance deadline and permit the distribution of the revised NPP through a quarterly newsletter, annual mailing, after 18 months of transition, or in a triennial mailing. In addition, many commenters supported electronic distribution of an NPP or a notice of material changes to the NPP. While not proposed, some commenters suggested eliminating or alternatives to the current requirements for health care providers with direct treatment relationships to hand the NPP to every individual patient and make a good faith attempt to obtain acknowledgement of receipt. A few commenters also expressed concern regarding the cost burden associated with revising and distributing a new NPP. One commenter argued that considerations of cost do not justify a delay in distributing a revised NPP. Final Rule First, the final rule adopts the modification to § 164.520(b)(1)(ii)(E), which requires certain statements in the NPP regarding uses and disclosures that require authorization. We note that, contrary to some commenter concerns, the final rule does not require the NPP to include a list of all situations requiring authorization. Instead, the NPP must contain a statement indicating that most uses and disclosures of psychotherapy notes (where appropriate), uses and disclosures of protected health information for marketing purposes, and disclosures that constitute a sale of protected health information require authorization, as well as a statement that other uses and disclosures not described in the NPP will be made only with authorization from the individual. The final rule does not require the NPP to include a description of a covered entity’s recordkeeping practices with respect to psychotherapy notes; however, covered entities are free to include such additional information in their NPP if they choose. Additionally, in response to requests by some commenters, we clarify that covered entities that do not record or maintain psychotherapy notes are not required to include a statement in their NPPs about the authorization requirement for uses and disclosures of psychotherapy notes. Second, because the final rule treats all subsidized treatment communications as marketing communications, we have not adopted the proposal to require a statement in the NPP about such communications and the ability of an individual to opt out. For further discussion on the PO 00000 Frm 00060 Fmt 4701 Sfmt 4700 decision to treat all subsidized treatment communications as marketing communications requiring an authorization, please see the above discussion regarding § 164.501. The final rule, however, adopts the proposed requirement for a statement in the NPP regarding fundraising communications and an individual’s right to opt out of receiving such communications, if a covered entity intends to contact an individual to raise funds for the covered entity. Because individuals will be provided the opportunity to opt out of fundraising communications with each solicitation, the final rule does not require the NPP to include the mechanism for individuals to opt out of receiving fundraising communications, although covered entities are free to include such information if they choose to do so. The final rule also adopts the proposal that the NPP inform individuals of their new right to restrict certain disclosures of protected health information to a health plan where the individual pays out of pocket in full for the health care item or service. Only health care providers are required to include such a statement in the NPP; other covered entities may retain the existing language indicating that a covered entity is not required to agree to a requested restriction. The final rule also requires covered entities to include in their NPP a statement of the right of affected individuals to be notified following a breach of unsecured protected health information. We believe that individuals should be informed of their right to receive and the obligations of covered entities to provide notification following a breach. We disagree with the commenters who argued that such a statement would cause individuals unnecessary concern and would create unfounded fear that covered entities cannot appropriately secure protected health information. Such advance notice of their rights should provide helpful context for individuals should they later receive a breach notification. In response to comments, we also clarify that a simple statement in the NPP that an individual has a right to or will receive notifications of breaches of his or her unsecured protected health information will suffice for purposes of this requirement. We do not intend for this requirement to add undue complexity or length to a covered entity’s NPP. Thus, the statement need not be entity-specific, such as by describing how the covered entity will conduct a risk assessment, include the regulatory descriptions of ‘‘breach’’ or ‘‘unsecured PHI,’’ or describe the types E:\FR\FM\25JAR2.SGM 25JAR2 sroberts on DSK5SPTVN1PROD with Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations of information to be provided in the actual breach notification to the individual. However, covered entities that wish to include additional or more detailed information may do so. These changes represent material changes to the NPP of covered entities. We disagree with the few commenters who argued that such modifications to § 164.520 do not constitute material changes of privacy practices requiring the distribution of new NPPs. The modifications to § 164.520 are significant and are important to ensure that individuals are aware of the HITECH Act changes that affect privacy protections and individual rights regarding protected health information. Section 164.520(c)(1) of the final rule requires a health plan that currently posts its NPP on its Web site in accordance with § 164.520(c)(3)(i) to: (1) Prominently post the material change or its revised notice on its web site by the effective date of the material change to the notice (e.g., the compliance date of this final rule) and (2) provide the revised notice, or information about the material change and how to obtain the revised notice, in its next annual mailing to individuals then covered by the plan, such as at the beginning of the plan year or during the open enrollment period. Health plans that do not have customer service web sites are required to provide the revised NPP, or information about the material change and how to obtain the revised notice, to individuals covered by the plan within 60 days of the material revision to the notice. These requirements apply to all material changes including, where applicable, the rule change adopted pursuant to GINA to prohibit most health plans from using or disclosing genetic information for underwriting purposes. We believe these distribution requirements best balance the right of individuals to be informed of their privacy rights with the burden on health plans to provide the revised NPP. We also note that health plans should provide both paper- and web-based notices in a way accessible to all beneficiaries, including those individuals with disabilities. These modifications provide an avenue for an individual to be informed of material changes upon their effective date while better aligning the NPP distribution with health plans’ normal mailings to individuals. For health care providers, the final rule does not modify the current requirements to distribute revisions to the NPP. As such, § 164.520(c)(2)(iv) requires that when a health care provider with a direct treatment VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 relationship with an individual revises the NPP, the health care provider must make the NPP available upon request on or after the effective date of the revision and must comply with the requirements of § 164.520(c)(2)(iii) to have the NPP available at the delivery site and to post the notice in a clear and prominent location. In response to several comments expressing concern about printing costs for new NPPs, we clarify that providers are not required to print and hand out a revised NPP to all individuals seeking treatment; providers must post the revised NPP in a clear and prominent location and have copies of the NPP at the delivery site for individuals to request to take with them. Providers are only required to give a copy of the NPP to, and obtain a good faith acknowledgment of receipt from, new patients. As a result, we do not believe that the current requirement is overly burdensome to providers, nor is it overly costly. We also clarify that while health care providers are required to post the NPP in a clear and prominent location at the delivery site, providers may post a summary of the notice in such a location as long as the full notice is immediately available (such as on a table directly under the posted summary) for individuals to pick up without any additional burden on their part. It would not be appropriate, however, to require the individual to have to ask the receptionist for a copy of the full NPP. To the extent that some covered entities have already revised their NPPs in response to the enactment of the HITECH Act or State law requirements, we clarify that as long as a covered entity’s current NPP is consistent with this final rule and individuals have been informed of all material revisions made to the NPP, the covered entity is not required to revise and distribute another NPP upon publication of this final rule. Finally, we note that to the extent a covered entity is required to comply with Section 504 of the Rehabilitation Act of 1973 or the Americans with Disabilities Act of 1990, the covered entity has an obligation to take steps that may be necessary to ensure effective communication with individuals with disabilities, which could include making the revised NPP or notice of material changes to the NPP available in alternate formats, such as Braille, large print, or audio. Response to Other Public Comments Comment: One commenter expressed concern about the addition of more information to the NPP when it is already very long and complex, while several commenters recommended that PO 00000 Frm 00061 Fmt 4701 Sfmt 4700 5625 the final rule require NPPs to be shortened, simplified, and written in a clear, easily understandable manner. In addition, while a few commenters suggested that HHS provide a sample or standard NPP, many more commenters requested flexibility in developing the content of their respective NPPs. Response: We believe that the additions to the NPP required by the final rule are necessary to fully inform individuals of the covered entity’s privacy practices and their rights. The NPP should be provided in a clear, concise, and easy to understand manner, and we clarify that covered entities may use a ‘‘layered notice’’ to implement the Rule’s provisions, so long as the elements required at § 164.520(b) are included in the document that is provided for the individual. For example, a covered entity may satisfy the NPP provisions by providing the individual with both a short notice that briefly summarizes the individual’s rights, as well as other information, and a longer notice, layered beneath the short notice that contains all the elements required by the Rule. Additionally, the Privacy Rule requires that the NPP be written in plain language, and we note that some covered entities may have obligations under other laws with respect to their communication with affected individuals. For example, to the extent a covered entity is obligated to comply with Title VI of the Civil Rights Act of 1964, the covered entity must take reasonable steps to ensure meaningful access for Limited English Proficient persons to the services of the covered entity, which could include translating the NPP into frequently encountered languages. In addition, we agree with the commenters who suggested that covered entities have flexibility and discretion to determine how to draft and prepare their NPPs. Because each NPP will vary based on the functions of the individual covered entity, there is no ‘‘one size fits all’’ approach. However, we continue to explore options for making model or best practice language available. Comment: One commenter requested elimination of the requirement that covered entities obtain agreement from individuals (an opt in) before electronic distribution while another commenter requested that HHS clarify that a covered entity may obtain an electronic agreement from an individual to receive an NPP electronically. Response: The Privacy Rule permits covered entities to distribute their NPPs or notices of material changes by email, provided the individual has agreed to receive an electronic copy. Although E:\FR\FM\25JAR2.SGM 25JAR2 5626 Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations internet access is a convenience of daily life for many individuals, maintaining the opt-in requirement ensures that individuals who are not able to or choose not to receive information electronically are fully informed of how their protected health information is being used and disclosed and of their individual rights with respect to this information. We clarify that agreement to receive electronic notice can be obtained electronically pursuant to the requirements at § 164.520(c)(3). sroberts on DSK5SPTVN1PROD with 9. Section 164.522(a)—Right To Request a Restriction of Uses and Disclosures Section 164.522(a) of the Privacy Rule requires covered entities to permit individuals to request that a covered entity restrict uses or disclosures of their protected health information for treatment, payment, and health care operations purposes, as well as for disclosures to family members and certain others permitted under § 164.510(b). While covered entities are not required to agree to such requests for restrictions, if a covered entity does agree to restrict the use or disclosure of an individual’s protected health information, the covered entity must abide by that restriction, except in emergency circumstances when the information is required for the treatment of the individual. Section 164.522 also includes provisions for the termination of such a restriction and requires that covered entities that have agreed to a restriction document the restriction in writing. Proposed Rule Section 13405(a) of the HITECH Act sets forth certain circumstances in which a covered entity now must comply with an individual’s request for restriction of disclosure of his or her protected health information. Specifically, section 13405(a) of the HITECH Act requires that when an individual requests a restriction on disclosure pursuant to § 164.522, the covered entity must agree to the requested restriction unless the disclosure is otherwise required by law, if the request for restriction is on disclosures of protected health information to a health plan for the purpose of carrying out payment or health care operations and if the restriction applies to protected health information that pertains solely to a health care item or service for which the health care provider has been paid out of pocket in full. To implement section 13405(a) of the HITECH Act, we proposed a number of changes to the Privacy Rule’s provisions regarding an individual’s right to VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 request restrictions of certain uses and disclosures. First, we proposed at § 164.522(a)(1)(vi) to require a covered entity to agree to a request by an individual to restrict the disclosure of protected health information about the individual to a health plan if: (A) the disclosure is for the purposes of carrying out payment or health care operations and is not otherwise required by law; and (B) the protected health information pertains solely to a health care item or service for which the individual, or person on behalf of the individual other than the health plan, has paid the covered entity in full. In recognition that there are many situations in which family members or other persons may pay for the individual’s treatment, we proposed to include language to the provision to ensure that this requirement not be limited to solely the individual paying for the health care item or service but would also include payment made by another person, other than the health plan, on behalf of the individual. We proposed to modify § 164.522(a)(1)(ii), which states that a covered entity is not required to agree to a restriction, to refer to this exception to that general rule. We noted in the NPRM that in cases where an individual has exercised his or her right to restrict disclosure to a health plan under the above circumstances, the covered entity is also prohibited from making such disclosures to a business associate of the health plan, because a covered entity may only disclose protected health information to a business associate of another covered entity if the disclosure would be permitted directly to the other covered entity. We also proposed conforming modifications to § 164.522(a)(2) and (3) regarding terminating restrictions and documentation of restrictions to reflect these new requirements, and to make clear that, unlike other agreed to restrictions, a covered entity may not unilaterally terminate a required restriction to a health plan under § 164.522(a)(1)(ii). We provided a number of clarifications, and solicited public comment on a number of issues, regarding these proposed provisions, as follows. We stated that we interpret section 13405(a) as giving the individual a right to determine for which health care items or services the individual wishes to pay out of pocket and restrict. Thus, section 13405(a) would not permit a covered entity to require individuals who wish to restrict disclosures about only certain health care items or services to a health plan to restrict disclosures of protected PO 00000 Frm 00062 Fmt 4701 Sfmt 4700 health information regarding all health care to the health plan. We requested comment on the types of treatment interactions between individuals and covered entities that would make implementing a restriction more difficult and ways to address such difficult situations, such as where an individual wishes to restrict a disclosure regarding a prescription to a health plan but because the provider electronically sends prescriptions to the pharmacy to be filled, the pharmacy may have already billed the health plan by the time the patient arrives at the pharmacy. We requested comment generally on whether covered health care providers that know of a restriction should inform other health care providers downstream of such restriction, including pharmacies, and whether technology could facilitate such notification. We requested comment on examples of the types of disclosures that may fall under this ‘‘required by law’’ exception. With respect to an individual, or someone on behalf of the individual, paying out of pocket for the health care item or service, we noted that the individual should not expect that this payment would count towards the individual’s out of pocket threshold with respect to his or her health plan benefits. We requested comment on how this provision will function with respect to HMOs, given our understanding that under most current HMO contracts with providers an individual could not pay the provider in full for the treatment or service received. We clarified in the NPRM that if an individual’s out of pocket payment for a health care item or service is not honored (e.g., the individual’s check bounces), the covered entity is not obligated to continue to abide by the requested restriction because the individual has not fulfilled the requirements necessary to obtain the restriction. Additionally, we stated our expectation in such cases that covered entities make some attempt to resolve any payment issues with the individual prior to sending the protected health information to the health plan, such as by notifying the individual that his or her payment did not go through and giving the individual an opportunity to submit payment and requesting comment on the extent to which covered entities must make reasonable efforts to secure payment from the individual prior to billing the health plan. We requested comment on the scope of a restriction and in what circumstances it should apply to a subsequent, but related, treatment E:\FR\FM\25JAR2.SGM 25JAR2 Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations encounter, such as follow-up care for treatment of a particular condition. sroberts on DSK5SPTVN1PROD with Overview of Public Comments We received many comments on these proposed provisions and our questions as to how they should apply. A number of commenters generally supported the provisions as being an important right for health care consumers. However, many commenters expressed concerns with these new requirements. Many commenters raised concerns with, and requested guidance on, how to operationalize a restriction. Several commenters were concerned with having to create separate records to ensure that restricted data is not inadvertently sent to or accessible by the health plan or to manually redact information from the medical record prior to disclosure to a health plan. Commenters argued that having to segregate restricted and unrestricted information or redact restricted information prior to disclosure would be burdensome as such a process would generally have to occur manually, and may result in difficulties with ensuring that treating providers continue to have access to the entire medical record. Some commenters were concerned specifically with having to manually redact or create separate records prior to a health plan audit, or otherwise with withholding information from a plan during an audit, to ensure a health plan would not see restricted information. With respect to the exception to a restriction for disclosures that are required by law, several commenters supported this exception but requested clarification on how such an exception would affect providers’ existing legal obligations. Many commenters suggested that providers would be prohibited from receiving cash payment from individuals for items or services otherwise covered by State or Federally funded programs, such as Medicare and Medicaid, and thus, requested that disclosures to such State or Federally funded programs not be eligible for restriction. Similarly, some commenters sought clarification on the effect of this provision where certain State laws prohibit ‘‘balance billing,’’ making it illegal for the provider to bill the patient for any covered services over and above any permissible copayment, coinsurance or deductible amounts. Some commenters asked that we clarify that the ‘‘required by law’’ exception allows providers to disclose protected health information subject to a restriction for Medicare and Medicaid audits, because those insurers require complete, accurate records for audits. VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 Other commenters were concerned with applying a restriction to only certain health care items or services provided during a single patient encounter or visit. Commenters argued that split billing is not possible for most providers or that it may be obvious to a health plan if one item or service out of a bundle is restricted and that unbundling services may be costly. One commenter suggested that individuals should only be able to restrict certain types of services/treatment (e.g., cosmetic surgery and family planning services) as such services are more easily segregable from other health care services. In response to our question regarding available electronic methods through which a prescribing provider could alert a pharmacy that an individual intends to pay out of pocket for a prescription and restrict disclosure to a health plan, commenters indicated they were generally unaware of any system that would alert a pharmacy of restrictions electronically, and many agreed that the cost and burden of flagging records manually would not be feasible for all covered entities. In general, commenters agreed that paper prescriptions would provide individuals with an opportunity to request a restriction when they arrive at the pharmacy. However, commenters also noted that returning to the use of paper prescriptions over electronic prescribing would be a step in the wrong direction, as there are many benefits to electronic prescribing, and it is important not to limit these benefits. Almost all of the comments we received regarding the obligation generally of health care providers that know of a restriction to inform downstream health care providers of the restriction argued that it should be the individual’s and not the provider’s responsibility to inform downstream providers of any requested restriction. While a few commenters stated that the provider should bear this responsibility, the majority believed that this obligation would be difficult and burdensome for a provider. Some commenters acknowledged that in time, more advanced electronic and automated systems may allow providers to notify other providers downstream of a restriction, but these commenters stressed that such systems are not widely available at this time. With respect to the requirement’s application to health care providers providing care within an HMO context, many commenters expressed support for the suggestion that HMO patients would have to use an out-of-network provider for treatment to ensure that the restricted information would not be PO 00000 Frm 00063 Fmt 4701 Sfmt 4700 5627 disclosed to the HMO. Some commenters indicated that State laws and/or provider contracts with an HMO may prohibit the provider from receiving a cash payment from an HMO patient above the patient’s cost-sharing amount for the health care item or service. Conversely, some commenters stated that individuals should not have to go out-of-network when requesting a restriction and instead, providers could and should treat the services as noncovered services and accept payment directly from the patient. Several commenters also suggested that managed care contracts would have to be revised or renegotiated in order to comply with this provision and as such, ample time for renegotiation should be provided. Commenters generally supported the language in the proposed rule making clear that a restriction would apply where an individual requests a restriction, but someone other than the individual (other than the health plan), such as a family member, pays for the individual’s care on behalf of the individual. One commenter asked for clarification that payment by any health plan would not constitute payment out of pocket by the individual. The commenter stated that such clarification was necessary to avoid the situation where an individual has coverage under multiple plans, pays for care with a secondary plan, requests a restriction on disclosure to the primary plan, and then the secondary plan proceeds to obtain reimbursement from the primary plan disclosing the protected health information at issue. Another commenter asked that we clarify that a clinical research participant whose health care services are paid for by a research grant can still qualify for a restriction to the individual’s health plan. Most commenters supported not having to abide by a requested restriction in cases where the individual’s method of payment is returned or otherwise does not go through. A few commenters suggested that a covered entity should include information to this effect in its notice of privacy practices. A number of commenters expressed concern with the ability of a provider to bill a health plan for services following an individual’s inability to pay. For example, a provider may find it difficult to be reimbursed for services if the provider did not obtain the plan’s required pre-certification for services because the individual initially agreed to pay out of pocket for the services. Several commenters asked for guidance on what constitutes a E:\FR\FM\25JAR2.SGM 25JAR2 sroberts on DSK5SPTVN1PROD with 5628 Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations ‘‘reasonable effort’’ to obtain payment from an individual prior to billing a health plan for health care services where an individual’s original form of payment fails, and argued that the effort required should not be too burdensome on providers. A number of commenters suggested various alternatives. A few commenters suggested that providers should be able to set a deadline for payment and then bill the plan if the patient fails to pay; others requested that the regulation set a specific timeframe in which providers must be paid or the requested restriction is terminated. Some commenters suggested that a ‘‘reasonable effort’’ should be based upon a covered entity making one or two attempts to contact the patient and obtain payment. Another commenter recommended that reasonable efforts should require the provider to make a good faith effort to obtain payment based on their usual debt collection practices. Other commenters requested clarification that reasonable efforts would not require a provider sending a bill to a collection agency. Some commenters were generally concerned with requiring a provider to wait too long for payment, as the provider could risk the plan not paying for the treatment if it is billed too late. Certain commenters argued that providers should not have to engage in any attempts to resolve payment issues if an individual’s payment fails prior to billing the health plan for the services. Finally, a number of commenters asked whether a provider could require payment in full at the time of the request for a restriction to avoid payment issues altogether. Finally, many commenters responded to the NPRM’s approach to follow-up care. The majority of commenters supported the idea that if an individual does not request a restriction and pay out of pocket for follow up care, then the covered entity may disclose the protected health information necessary to obtain payment from the health plan for such follow up care, recognizing that some of the protected health information may relate to and/or indicate that the individual received the underlying health care item or service to which a restriction applied. A few commenters asked whether individual authorization would be required to disclose previously restricted protected health information to a health plan if the individual does not want to restrict the follow up care. A number of commenters expressed support for providers counseling patients on the consequences of not restricting followup care. A few commenters were VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 concerned as to how a provider would know when such counseling was needed and what it should include, and asked whether giving the individual a written statement explaining the consequences would suffice. Final Rule We adopt the modifications to § 164.522 as proposed in the NPRM to implement section 13405(a) of the HITECH Act. In response to questions and comments regarding how to operationalize these requirements, we provide the following clarifications. We clarify that these provisions do not require that covered health care providers create separate medical records or otherwise segregate protected health information subject to a restricted health care item or service. Covered health care providers will, however, need to employ some method to flag or make a notation in the record with respect to the protected health information that has been restricted to ensure that such information is not inadvertently sent to or made accessible to the health plan for payment or health care operations purposes, such as audits by the health plan. Covered entities should already have in place, and thus be familiar with applying, minimum necessary policies and procedures, which require limiting the protected health information disclosed to a health plan to the amount reasonably necessary to achieve the purpose of the disclosure. Thus, covered entities should already have mechanisms in place to appropriately limit the protected health information that is disclosed to a health plan. With respect to commenters who were concerned about providers being able to continue to meet their legal obligations, such as disclosing protected health information to Medicare or Medicaid for required audits, we note that the statute and final rule continue to allow disclosures that are otherwise required by law, notwithstanding that an individual has requested a restriction on such disclosures. Thus, a covered entity may disclose the protected health information necessary to meet the requirements of the law. Under the Privacy Rule, ‘‘required by law’’ is defined at § 164.103 as a mandate contained in law that compels a covered entity to make a use or disclosure of protected health information and that is enforceable in a court of law. For purposes of this definition, ‘‘required by law’’ includes Medicare conditions of participation with respect to health care providers participating in the program, and statutes and regulations that require the production of information if PO 00000 Frm 00064 Fmt 4701 Sfmt 4700 payment is sought under a government program providing public benefits. Therefore, if a covered entity is required by law to submit protected health information to a Federal health plan, it may continue to do so as necessary to comply with that legal mandate. With respect to commenters’ concerns with prohibitions in State law and under Medicare and Medicaid that prevent providers from billing, and receiving cash payment from, an individual for covered services over and above any permissible cost sharing amounts, we provide the following guidance. If a provider is required by State or other law to submit a claim to a health plan for a covered service provided to the individual, and there is no exception or procedure for individuals wishing to pay out of pocket for the service, then the disclosure is required by law and is an exception to an individual’s right to request a restriction to the health plan pursuant to § 154.522(a)(1)(vi)(A) of the Rule. With respect to Medicare, it is our understanding that when a physician or supplier furnishes a service that is covered by Medicare, then it is subject to the mandatory claim submission provisions of section 1848(g)(4) of the Social Security Act (the Act), which requires that if a physician or supplier charges or attempts to charge a beneficiary any remuneration for a service that is covered by Medicare, then the physician or supplier must submit a claim to Medicare. However, there is an exception to this rule where a beneficiary (or the beneficiary’s legal representative) refuses, of his/her own free will, to authorize the submission of a bill to Medicare. In such cases, a Medicare provider is not required to submit a claim to Medicare for the covered service and may accept an out of pocket payment for the service from the beneficiary. The limits on what the provider may collect from the beneficiary continue to apply to charges for the covered service, notwithstanding the absence of a claim to Medicare. See the Medicare Benefit Policy Manual, Internet only Manual pub. 100–2, ch. 15, sect. 40, available at https:// www.cms.gov/manuals/Downloads/ bp102c15.pdf. Thus, if a Medicare beneficiary requests a restriction on the disclosure of protected health information to Medicare for a covered service and pays out of pocket for the service (i.e., refuses to authorize the submission of a bill to Medicare for the service), the provider must restrict the disclosure of protected health information regarding the service to Medicare in accordance with § 164.522(a)(1)(vi). E:\FR\FM\25JAR2.SGM 25JAR2 sroberts on DSK5SPTVN1PROD with Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations Certain commenters raised concerns with an individual requesting a restriction with respect to only one of several health care items or services provided in a single patient encounter, and a provider being prohibited from unbundling, or it being more costly to unbundle, the services for purposes of billing a health plan. In such cases, we expect providers to counsel patients on the ability of the provider to unbundle the items or services and the impact of doing so (e.g., the health plan still may be able to determine that the restricted item or service was performed based on the context). If a provider is able to unbundle the items or services and accommodate the individual’s wishes after counseling the individual on the impact of unbundling, it should do so. If a provider is not able to unbundle a group of items or services, the provider should inform the individual and give the individual the opportunity to restrict and pay out of pocket for the entire bundle of items or services. Where a provider is not able to unbundle a group of bundled items or services, we view such group of bundled items or services as one item or service for the purpose of applying § 164.522(a)(1)(v). However, we would expect a provider to accommodate an individual’s request for a restriction for separable and unbundled health care items or services, even if part of the same treatment encounter, such as in the prior example with respect to the patient receiving both treatment for asthma and diabetes. Thus, we decline to provide as a general rule that an individual may only restrict either all or none of the health care items or services that are part of one treatment encounter. In response to the question we posed in the NPRM regarding methods through which a provider could electronically (such as through an e-prescribing tool) notify a pharmacist of an individual’s restriction request, the majority of commenters indicated that there currently is not a widely available method for electronically notifying a pharmacy that a patient has requested a restriction. Further, commenters generally argued that it would be costly, burdensome, and unworkable for a provider to attempt to notify all subsequent providers of an individual’s restriction request, particularly given the lack of automated tools to make such notifications, and thus, it should remain the obligation of the individual to notify downstream providers if the individual wants to restrict protected health information to a health plan. We agree that it would be unworkable at this point, given the lack of automated VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 technologies to support such a requirement, to require health care providers to notify downstream providers of the fact that an individual has requested a restriction to a health plan. However, we do encourage providers to counsel patients that they would need to request a restriction and pay out of pocket with other providers for the restriction to apply to the disclosures by such providers. In the case of an individual who wants to restrict disclosures to a health plan concerning a prescribed medication, the prescribing provider can provide the patient with a paper prescription to allow the individual an opportunity to request a restriction and pay for the prescription with the pharmacy before the pharmacy has submitted a bill to the health plan. However, while we do not require it, providers are permitted and encouraged to assist individuals as feasible in alerting downstream providers of the individual’s desire to request a restriction and pay out of pocket for a particular health care item or service. For example, consider an individual who is meeting with her primary physician and requests a restriction on tests that are being administered to determine if she has a heart condition. If, after conducting the tests, the patient’s primary physician refers the patient to a cardiologist, it is the patient’s obligation to request a restriction from the subsequent provider, the cardiologist, if she wishes to pay out of pocket rather than have her health plan billed for the visit. Although the primary physician in this example would not be required to alert the cardiologist of the patient’s potential desire to request a restriction, we encourage providers to do so if feasible or in the very least, to engage in a dialogue with the patient to ensure that he or she is aware that it is the patient’s obligation to request restrictions from subsequent providers. In response to commenters who were confused about whether the individual or the provider would have the obligation of notifying subsequent providers when a Health Information Exchange is involved, we clarify that the responsibility to notify downstream providers of a restriction request in this situation also remains with the individual, and not the provider. With respect to HMOs, we clarify that a provider providing care in such a setting should abide by an individual’s requested restriction unless doing so would be inconsistent with State or other law. Thus, if a provider within an HMO is prohibited by law from accepting payment from an individual PO 00000 Frm 00065 Fmt 4701 Sfmt 4700 5629 above the individual’s cost-sharing amount (i.e., the provider cannot accept an out of pocket payment from the individual for the service), then the provider may counsel the individual that he or she will have to use an outof-network provider for the health care item or service in order to restrict the disclosure of protected health information to the HMO for the health care. Providers operating within an HMO context and who are able under law to treat the health care services to which the restriction would apply as out-of-network services should do so in order to abide by the requested restriction. We would not consider a contractual requirement to submit a claim or otherwise disclose protected health information to an HMO to exempt the provider from his or her obligations under this provision. Further, the final rule provides a 180day compliance period beyond the effective date of these revisions to the Privacy Rule, during which provider contracts with HMOs can be updated as needed to be consistent with these new requirements. As proposed in the NPRM, under the final rule, a covered entity must apply a restriction not only where an individual pays in full for the healthcare item or service, but also where a family member or other person pays for the item or service on behalf of the individual. We decline to modify the regulation, as suggested by one commenter, to provide that payment from ‘‘any’’ health plan, rather than the one to which the disclosure is restricted, should not constitute payment on behalf of the individual. In response to the commenter’s concern about difficulties in coordination of benefits for individuals with coverage under multiple plans, we note that this provision does not impede a health plan’s ability to disclose protected health information as necessary to another health plan for coordination of benefits. Thus, health plans may continue to make such disclosures. Many commenters supported the discussion in the NPRM regarding not abiding by a restriction if an individual’s payment is dishonored. In such cases, we continue to expect that providers will make a reasonable effort to contact the individual and obtain payment prior to billing a health plan. We do not prescribe the efforts a health care provider must make but leave that up to the provider’s policies and individual circumstances. While we require the provider to make a reasonable effort to secure payment from the individual, this requirement is not intended to place an additional E:\FR\FM\25JAR2.SGM 25JAR2 5630 Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations sroberts on DSK5SPTVN1PROD with burden on the provider but is instead intended to align with its current policies for contacting individuals to obtain an alternative form of payment to one that was dishonored. We do not require that the individual’s debt be placed in collection before a provider is permitted to bill a health plan for the health care services. Further, a provider may choose to require payment in full at the time of the request for a restriction to avoid payment issues altogether. Similarly, where precertification is required for a health plan to pay for services, a provider may require the individual to settle payments for the care prior to providing the service and implementing a restriction to avoid the situation where the provider is unable to be reimbursed by either the individual or the health plan. We also recognize that a provider may not be able to implement a restriction where an individual waits until care has been initiated to make such a request, such as in the case of a hospital stay, in which case the individual’s protected health information may have already been disclosed to the health plan. With respect to restrictions and follow-up care, we continue to maintain the approach discussed in the NPRM. If an individual has a restriction in place with respect to a health care service but does not pay out of pocket and request a restriction with regard to follow-up treatment, and the provider needs to include information that was previously restricted in the bill to the health plan in order to have the service deemed medically necessary or appropriate, then the provider is permitted to disclose such information so long as doing so is consistent with the provider’s minimum necessary policies and procedures. We also clarify that such a disclosure would continue to be permitted for payment purposes and thus, would not require the individual’s written authorization. However, as we did in the NPRM, we highly encourage covered entities to engage in open dialogue with individuals to ensure that they are aware that previously restricted protected health information may be disclosed to the health plan unless they request an additional restriction and pay out of pocket for the follow-up care. Response to Other Public Comments Comment: Several commenters asked that the provision be limited to just providers and not to covered entities in general. Commenters also asked for clarification on whether the restriction prohibits providers from giving protected health information to health plans solely for payment or health care VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 operations purposes in such cases or all entities that may receive protected health information for payment or health care operations. Response: We clarify that this provision, in effect, will apply only to covered health care providers. However, the provisions of § 164.522(a) apply to covered entities generally and thus, we decline to alter the regulatory text. In response to commenters’ concerns regarding disclosure for payment or health care operations purposes to entities other than the health plan, we clarify that this provision does not affect disclosures to these other entities as permitted by the Privacy Rule. Comment: Commenters asked what the liability is for a provider who discloses restricted protected health information to a plan. Response: A provider who discloses restricted protected health information to the health plan is making a disclosure in violation of the Privacy Rule and the HITECH Act, which, as with other impermissible disclosures is subject to the imposition of possible criminal penalties, civil money penalties, or corrective action. Comment: Several commenters asked that we clarify that the ‘‘required by law’’ exception allows providers to respond to subpoenas, court orders, and judicial proceedings. Response: The ‘‘required by law’’ exception in § 164.522(a)(1)(vi) does allow health care providers to respond to court orders and subpoenas issued by a court requiring disclosure of protected health information to a health plan. See the definition of ‘‘required by law’’ at § 164.103. Further, § 164.522(a)(1)(vi) does not affect the disclosure of protected health information to entities that are not health plans and thus, disclosures to these other entities made as required by law, for judicial and administrative proceedings, or for law enforcement activities in accordance with §§ 164.512(a), 164.512(e), and 164.512(f), respectively, continue to be permitted. Comment: Several commenters suggested that the final rule be written to ensure that there are no conflicts with the Fair Debt Collection Practices Act and similar State laws regarding the legal obligation to validate a debt that is disputed by a debtor. Commenters sought clarification on whether the provider can still disclose protected health information for the recovery of debts. Response: The final rule does not impact a provider’s ability to disclose protected health information for payment purposes to a collection agency or otherwise for collection activities PO 00000 Frm 00066 Fmt 4701 Sfmt 4700 related to an individual’s debt to the provider. Section 164.522(a) restricts disclosures to a health plan for payment purposes where the individual has paid out of pocket for the health care item or service that is the subject of the disclosure and requests such a restriction. Comment: Commenters asked that we clarify whether payment with a Flexible Spending Account (FSA) or Health Savings Account (HSA) is considered a payment by a person on behalf of the individual. Response: An individual may use an FSA or HSA to pay for the health care items or services that the individual wishes to have restricted from another plan; however, in doing so the individual may not restrict a disclosure to the FSA or HSA necessary to effectuate that payment. Comment: When a restriction is requested, the provider is also prohibited from making disclosures of the restricted protected health information to the business associate of the health plan. One commenter suggested that the final rule make it the priority of the business associate to inform the provider that they are acting as the business associate of the health plan to ensure provider compliance with the rule. Other comments misconstrued the preamble statements on this issue and commented that a provider should be allowed to provide restricted protected health information to its own business associates. Response: A provider that is prohibited from disclosing protected health information to a health plan may not disclose such information to the health plan’s business associate. We do not include a requirement that the business associate inform the provider that they are acting as a business associate of the health plan as it is the provider’s responsibility to know to whom and for what purposes it is making a disclosure. We also clarify that a provider is not prohibited from disclosing protected health information restricted from a health plan to its own business associates for the provider’s own purposes. Comment: One commenter expressed concern about the number of workforce members who must know about the restriction and indicated that this may create a risk for potential error with regard to the information. Response: Covered entities must identify those workforce members or class of persons who need access to particular protected health information, and appropriately train their workforce members as necessary to comply with these new requirements. E:\FR\FM\25JAR2.SGM 25JAR2 Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations sroberts on DSK5SPTVN1PROD with 10. Section 164.524—Access of Individuals to Protected Health Information Proposed Rule Section 164.524 of the Privacy Rule currently establishes, with limited exceptions, an enforceable means by which individuals have a right to review or obtain copies of their protected health information to the extent such information is maintained in the designated record set(s) of a covered entity. An individual’s right of access exists regardless of the format of the protected health information, and the standards and implementation specifications that address individuals’ requests for access and timely action by the covered entity (i.e., provision of access, denial of access, and documentation) apply to an electronic environment in a similar manner as they do to a paper-based environment. See The HIPAA Privacy Rule’s Right of Access and Health Information Technology (providing guidance with respect to how § 164.524 applies in an electronic environment and how health information technology can facilitate providing individuals with this important privacy right), available at: https://www.hhs.gov/ocr/privacy/hipaa/ understanding/special/healthit/ eaccess.pdf. Section 13405(e) of the HITECH Act strengthens the Privacy Rule’s right of access with respect to covered entities that use or maintain an electronic health record (EHR) on an individual. Section 13405(e) provides that when a covered entity uses or maintains an EHR with respect to protected health information of an individual, the individual shall have a right to obtain from the covered entity a copy of such information in an electronic format and the individual may direct the covered entity to transmit such copy directly to the individual’s designee, provided that any such choice is clear, conspicuous, and specific. Section 13405(e) also provides that any fee imposed by the covered entity for providing such an electronic copy shall not be greater than the entity’s labor costs in responding to the request for the copy. Section 13405(e) applies by its terms only to protected health information in EHRs. However, incorporating these new provisions in such a limited manner in the Privacy Rule could result in a complex set of disparate requirements for access to protected health information in EHR systems versus other types of electronic records systems. As such, the Department proposed to use its authority under section 264(c) of HIPAA to prescribe the VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 rights individuals should have with respect to their individually identifiable health information to strengthen the right of access as provided under section 13405(e) of the HITECH Act more uniformly to all protected health information maintained in one or more designated record sets electronically, regardless of whether the designated record set is an EHR. The public comments and final regulation on the scope are discussed here. The proposed amendments to each provision implicated by section 13405(e), together with the public comments and final regulation, are discussed more specifically in separate sections below. Overview of Public Comments Most commenters were opposed to the proposal to expand the scope of the individual access provision to include all electronic designated record sets and favored limiting the requirement to EHRs. These commenters felt that limiting the access provision to EHRs was consistent with congressional intent and questioned the authority of the Department to expand the scope. Commenters also argued that having disparate requirements for different systems would not be confusing, and requiring electronic access to electronic designated record sets that are not EHRs would be highly burdensome for covered entities. Specifically, commenters stated that the proposed requirement for electronic access would include numerous types of legacy systems, many of which are incapable of producing reports in easily readable formats that can be transmitted electronically. These commenters indicated that a significant amount of information technology development and investment would be needed to comply with this requirement if it applies to all electronic designated record sets. A number of consumer advocates supported the expanded scope to include all electronic designated records sets in addition to EHRs. These commenters felt that this would provide complete transparency for consumers, help individuals gain access to their medical records and make betterinformed decisions about their health care, and promote consistent and uniform practices. Final Rule The final rule adopts the proposal to amend the Privacy Rule at § 164.524(c)(2)(ii) to require that if an individual requests an electronic copy of protected health information that is maintained electronically in one or more designated record sets, the covered PO 00000 Frm 00067 Fmt 4701 Sfmt 4700 5631 entity must provide the individual with access to the electronic information in the electronic form and format requested by the individual, if it is readily producible, or, if not, in a readable electronic form and format as agreed to by the covered entity and the individual. In such cases, to the extent possible, we expect covered entities to provide the individual with a machine readable copy of the individual’s protected health information. The Department considers machine readable data to mean digital information stored in a standard format enabling the information to be processed and analyzed by computer. For example, this would include providing the individual with an electronic copy of the protected health information in the format of MS Word or Excel, text, HTML, or text-based PDF, among other formats. We disagree with commenters that questioned the Department’s authority to extend the strengthened electronic access right to all protected health information maintained electronically in designated record sets, and believe that this extended electronic right of access is important for individuals as covered entities increasingly transition from paper to electronic records. With regard to the additional burdens on covered entities, we note that providing access to protected health information held in electronic designated record sets was already required under the Privacy Rule at § 164.524, which applies to protected health information in both paper and electronic designated record sets, and which requires providing the copy in the form and format requested by the individual, including electronically, if it is readily producible in such form and format. We anticipate the additional burden to be small due to the flexibility permitted in satisfying this new requirement, as discussed in the section on Form and Format. Response to Other Public Comments Comment: Some commenters worried that giving individuals access to administrative systems (in contrast to clinical systems) would present a security concern to covered entities. Response: Covered entities are not required by this provision to provide individuals with direct access to their systems. They must only provide individuals with an electronic copy of their protected health information. Comment: Commenters requested clarification on what constitutes an EHR. Response: Under this final rule, the requirement to provide individuals with access to an electronic copy includes all E:\FR\FM\25JAR2.SGM 25JAR2 5632 Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations protected health information maintained in an electronic designated record set held by a covered entity. Because we are not limiting the right of electronic access to EHRs, we do not believe there is a need to define or further clarify the term at this time. Comment: One commenter requested clarification that this electronic access requirement preempts State laws that diminish, block, or limit individual access to their records. Response: We clarify that this HIPAA electronic right of access requirement does preempt contrary State law unless such law is more stringent. In the case of right of access, more stringent means that such State law permits greater rights of access to the individual. Comment: Several commenters sought clarification of how the new e-access provisions would apply to business associates. One commenter asked whether business associates could continue to provide patients access to records when permitted and acting on behalf of a covered entity. Another commenter asked whether business associates are required to provide information to covered entities and not to individuals directly. One commenter was opposed to direct access from a business associate because of security concerns and increased burden on business associates if corrections are needed. Response: How and to what extent a business associate is to support or fulfill a covered entity’s obligation to provide individuals with electronic access to their records will be governed by the business associate agreement between the covered entity and the business associate. For example, the business associate agreement may provide for the business associate to give copies of the requested information directly to the individual, or to the covered entity for the covered entity to provide the copies to the individual. There is no separate requirement on business associates to provide individuals with direct access to their health records, if that is not what has been agreed to between the covered entity and the business associate in the business associate agreement. a. Form and Format sroberts on DSK5SPTVN1PROD with Proposed Rule Section 164.524(c)(2) of the Privacy Rule currently requires a covered entity to provide the individual with access to the protected health information in the form or format requested by the individual, if it is readily producible in such form or format, or, if not, in a readable hard copy form or such other VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 form or format as agreed to by the covered entity and the individual. Section 13405(e) of the HITECH Act expands this requirement by explicitly requiring a covered entity that uses or maintains an EHR with respect to protected health information to provide the individual with a copy of such information in an electronic format. We proposed to implement this statutory provision, in conjunction with our broader authority under section 264(c) of HIPAA, by requiring, in proposed § 164.524(c)(2)(ii), that if the protected health information requested is maintained electronically in one or more designated record sets, the covered entity must provide the individual with access to the electronic information in the electronic form and format requested by the individual, if it is readily producible, or, if not, in a readable electronic form and format as agreed to by the covered entity and the individual. This provision would require any covered entity that electronically maintains the protected health information about an individual, in one or more designated record sets, to provide the individual with an electronic copy of such information (or summary or explanation if agreed to by the individual in accordance with proposed § 164.524(c)(2)(iii)) in the electronic form and format requested or in an otherwise agreed upon electronic form and format. While an individual’s right of access to an electronic copy of protected health information is currently limited under the Privacy Rule by whether the form or format requested is readily producible, covered entities that maintain such information electronically in a designated record set would be required under these proposed modifications to provide some type of electronic copy, if requested by an individual. Because we did not want to bind covered entities to standards that may not yet be technologically mature, we proposed to permit covered entities to make some other agreement with individuals as to an alternative means by which they may provide a readable electronic copy to the extent the requested means is not readily producible. If, for example, a covered entity received a request to provide electronic access via a secure web-based portal, but the only readily producible version of the protected health information was in portable document format (PDF), proposed § 164.524(c)(2)(ii) would require the covered entity to provide the individual with a PDF copy of the protected health information, if agreed to by the covered entity and the individual. We noted that PO 00000 Frm 00068 Fmt 4701 Sfmt 4700 while a covered entity may provide individuals with limited access rights to their EHR, such as through a secure web-based portal, nothing under the current Rule or proposed modifications would require a covered entity to have this capability. We noted that the option of arriving at an alternative agreement that satisfies both parties is already part of the requirement to provide access under § 164.524(c)(2)(i), so extension of such a requirement to electronic access should present few implementation difficulties. Further, as with other disclosures of protected health information, in providing the individual with an electronic copy of protected health information through a web-based portal, email, on portable electronic media, or other means, covered entities should ensure that reasonable safeguards are in place to protect the information. We also noted that the proposed modification presumes that covered entities have the capability of providing an electronic copy of protected health information maintained in their designated record set(s) electronically through a secure web-based portal, via email, on portable electronic media, or other manner. We invited public comment on this presumption. Overview of Public Comments We received many comments and requests for clarification and guidance regarding the permitted methods for offering protected health information on electronic media, and the acceptable form and format of the electronic copy. Several commenters suggested that covered entities be permitted flexibility in determining available electronic formats and requested clarification on what is considered ‘‘readily producible.’’ These commenters expressed concerns that a limited number of permissible electronic formats may result in a situation where protected health information could not be converted from a particular electronic system. Other commenters indicated that there should be minimum standards and clearly defined media that are permissible to meet this requirement. One commenter felt that this requirement is important but should be deferred until covered entities have improved their technological capabilities. Many commenters requested guidance on how to proceed if a covered entity and an individual are unable to come to an agreement on the medium of choice and what is expected in terms of accommodating the individual’s medium of choice. Some commenters suggested various alternate solutions if E:\FR\FM\25JAR2.SGM 25JAR2 Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations sroberts on DSK5SPTVN1PROD with an agreement cannot be reached, including any readily producible format, PDF, or hard copy protected health information. Some covered entities felt that individuals should not have an unlimited choice in terms of the electronic media they are willing to accept, and should only be permitted to confine their choices of electronic media to a couple of options that the covered entity has available. Final Rule The final rule adopts the proposal to require covered entities to provide electronic information to an individual in the electronic form and format requested by the individual, if it is readily producible, or, if not, in a readable electronic form and format as agreed to by the covered entity and the individual. We recognize that what is available in a readable electronic form and format will vary by system and that covered entities will continue to improve their technological capabilities over time. We therefore allow covered entities the flexibility to provide readily producible electronic copies of protected health information that are currently available on their various systems. A covered entity is not required to purchase new software or systems in order to accommodate an electronic copy request for a specific form that is not readily producible by the covered entity at the time of the request, provided that the covered entity is able to provide some form of electronic copy. We note that some legacy or other systems may not be capable of providing any form of electronic copy at present and anticipate that some covered entities may need to make some investment in order to meet the basic requirement to provide some form of electronic copy. We agree with covered entities that individuals should not have an unlimited choice in the form of electronic copy requested. However, covered entities must still provide individuals with some kind of readable electronic copy. If an individual requests a form of electronic copy that the covered entity is unable to produce, the covered entity must offer other electronic formats that are available on their systems. If the individual declines to accept any of the electronic formats that are readily producible by the covered entity, the covered entity must provide a hard copy as an option to fulfill the access request. While we remain neutral on the type of technology that covered entities may adopt, a PDF is a widely recognized format that would satisfy the electronic access requirement if it is the VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 individual’s requested format or if the individual agrees to accept a PDF instead of the individual’s requested format. Alternatively, there may be circumstances where an individual prefers a simple text or rich text file and the covered entity is able to accommodate this preference. A hard copy of the individual’s protected health information would not satisfy the electronic access requirement. However, a hard copy may be provided if the individual decides not to accept any of the electronic formats offered by the covered entity. Response to Other Public Comments Comment: Several covered entities commented on the form of a request for access to electronic protected health information. Some expressed appreciation for permitting an electronic request process, including e-signatures and authentication. Some expressed opposition to the requirement for a signed request in writing, as it would be highly burdensome and cause delays. Covered entities sought guidance on elements that would be required or permitted in a request form for individuals. Response: We clarify that the requirement at § 164.524(b)(1), which states that the covered entity may require individuals to make requests for access in writing, provided that it informs individuals of such a requirement, remains unchanged. Therefore, covered entities may at their option require individuals to make requests for electronic copies of their protected health information in writing. We note that the Privacy Rule allows for electronic documents to qualify as written documents, as well as electronic signatures to satisfy any requirements for a signature, to the extent the signature is valid under applicable law. If the covered entity chooses to require a written request, it has flexibility in determining what information to put into the request form. However, the request form may not be in any way designed to discourage an individual from exercising his or her right. A covered entity may also choose to accept an individual’s oral request for an electronic copy of their protected health information without written signature or documentation. Comment: We received several comments on the content that covered entities are required to provide in response to an electronic access request. Some commenters felt that there should be a defined minimum set of data elements to satisfy this requirement, particularly for non-EHR data. Covered entities also requested clarification on PO 00000 Frm 00069 Fmt 4701 Sfmt 4700 5633 how to handle links to images or other data. Response: We clarify that just as is currently required for hard copy protected health information access requests, covered entities must provide an electronic copy of all protected health information about the individual in an electronically maintained designated record set, except as otherwise provided at § 164.524(a). If the designated record set includes electronic links to images or other data, the images or other data that is linked to the designated record set must also be included in the electronic copy provided to the individual. The electronic copy must contain all protected health information electronically maintained in the designated record set at the time the request is fulfilled. The individual may request, however, only a portion of the protected health information electronically maintained in the designated record set, in which case the covered entity is only required to provide the requested information. Comment: One commenter asserted that the request for protected health information should only apply to protected health information the covered entity has at the time of the request, not any additional protected health information that it obtains while processing the request. Response: We clarify that the electronic copy must reflect all electronic protected health information held by the covered entity in a designated record set, or the subset of electronic protected health information specifically requested by the individual, at the time the request is fulfilled. Comment: One commenter asked for confirmation that the new electronic requirement does not include a requirement to scan paper and provide electronic copies of records held in paper form. Response: We clarify that covered entities are not required to scan paper documents to provide electronic copies of records maintained in hard copy. We note that for covered entities that have mixed media, it may in some cases be easier to scan and provide all records in electronic form rather than provide a combination of electronic and hard copies, however this is in no way required. Comment: Many commenters expressed security concerns related to this new requirement. Covered entities felt that they should not have to use portable devices brought by individuals (particularly flash drives), due to the security risks that this would introduce to their systems. Some covered entities E:\FR\FM\25JAR2.SGM 25JAR2 sroberts on DSK5SPTVN1PROD with 5634 Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations additionally asserted that requiring the use of individually-supplied media is prohibited by the Security Rule, based on the risk analysis determination of an unacceptable risk to the confidentiality, integrity and availability of the covered entity’s electronic protected health information. Response: We acknowledge these security concerns and agree with commenters that it may not be appropriate for covered entities to accept the use of external portable media on their systems. Covered entities are required by the Security Rule to perform a risk analysis related to the potential use of external portable media, and are not required to accept the external media if they determine there is an unacceptable level of risk. However, covered entities are not then permitted to require individuals to purchase a portable media device from the covered entity if the individual does not wish to do so. The individual may in such cases opt to receive an alternative form of the electronic copy of the protected health information, such as through email. Comment: Several commenters specifically commented on the option to provide electronic protected health information via unencrypted email. Covered entities requested clarification that they are permitted to send individuals unencrypted emails if they have advised the individual of the risk, and the individual still prefers the unencrypted email. Some felt that the ‘‘duty to warn’’ individuals of risks associated with unencrypted email would be unduly burdensome on covered entities. Covered entities also requested clarification that they would not be responsible for breach notification in the event that unauthorized access of protected health information occurred as a result of sending an unencrypted email based on an individual’s request. Finally, one commenter emphasized the importance that individuals are allowed to decide if they want to receive unencrypted emails. Response: We clarify that covered entities are permitted to send individuals unencrypted emails if they have advised the individual of the risk, and the individual still prefers the unencrypted email. We disagree that the ‘‘duty to warn’’ individuals of risks associated with unencrypted email would be unduly burdensome on covered entities and believe this is a necessary step in protecting the protected health information. We do not expect covered entities to educate individuals about encryption technology and the information VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 security. Rather, we merely expect the covered entity to notify the individual that there may be some level of risk that the information in the email could be read by a third party. If individuals are notified of the risks and still prefer unencrypted email, the individual has the right to receive protected health information in that way, and covered entities are not responsible for unauthorized access of protected health information while in transmission to the individual based on the individual’s request. Further, covered entities are not responsible for safeguarding information once delivered to the individual. b. Third Parties Proposed Rule Section 164.524(c)(3) of the Privacy Rule currently requires the covered entity to provide the access requested by the individual in a timely manner, which includes arranging with the individual for a convenient time and place to inspect or obtain a copy of the protected health information, or mailing the copy of protected health information at the individual’s request. The Department had previously interpreted this provision as requiring a covered entity to mail the copy of protected health information to an alternative address requested by the individual, provided the request was clearly made by the individual and not a third party. Section 13405(e)(1) of the HITECH Act provides that if the individual chooses, he or she has a right to direct the covered entity to transmit an electronic copy of protected health information in an EHR directly to an entity or person designated by the individual, provided that such choice is clear, conspicuous, and specific. Based on section 13405(e)(1) of the HITECH Act and our authority under section 264(c) of HIPAA, we proposed to expand § 164.524(c)(3) to expressly provide that, if requested by an individual, a covered entity must transmit the copy of protected health information directly to another person designated by the individual. This proposed amendment is consistent with the Department’s prior interpretation on this issue and would apply without regard to whether the protected health information is in electronic or paper form. We proposed to implement the requirement of section 13405(e)(1) that the individual’s ‘‘choice [be] clear, conspicuous, and specific’’ by requiring that the individual’s request be ‘‘in writing, signed by the individual, and clearly identify the designated person and where to send the copy of protected health information.’’ We noted that the PO 00000 Frm 00070 Fmt 4701 Sfmt 4700 Privacy Rule allows for electronic documents to qualify as written documents for purposes of meeting the Rule’s requirements, as well as electronic signatures to satisfy any requirements for a signature, to the extent the signature is valid under applicable law. Thus, a covered entity could employ an electronic process for receiving an individual’s request to transmit a copy of protected health information to his or her designee under this proposed provision. Whether the process is electronic or paper-based, a covered entity must implement reasonable policies and procedures under § 164.514(h) to verify the identity of any person who requests protected health information, as well as implement reasonable safeguards under § 164.530(c) to protect the information that is used or disclosed. Overview of Public Comments Commenters requested clarification regarding the proposal to transmit an electronic copy of protected health information to another person designated by the individual. In particular, covered entities sought clarification on whether or not an authorization is required prior to transmitting the requested electronic protected health information to a third party designated by the individual. Some commenters supported the ability to provide electronic protected health information access to third parties without individual authorization, while others felt that authorization should be required. Covered entities requested clarification that they are not liable when making reasonable efforts to verify the identity of a third party recipient identified by the individual. Final Rule The final rule adopts the proposed amendment § 164.524(c)(3) to expressly provide that, if requested by an individual, a covered entity must transmit the copy of protected health information directly to another person designated by the individual. In contrast to other requests under § 164.524, when an individual directs the covered entity to send the copy of protected health information to another designated person, the request must be made in writing, signed by the individual, and clearly identify the designated person and where to send the copy of the protected health information. If a covered entity has decided to require all access requests in writing, the third party recipient information and signature by the individual can be included in the same written request; no additional or separate written request is E:\FR\FM\25JAR2.SGM 25JAR2 Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations required. This written request for protected health information to be sent to a designated person is distinct from an authorization form, which contains many additional required statements and elements (see § 164.508(c)). Covered entities may rely on the information provided in writing by the individual when providing protected health information to a third party recipient identified by the individual, but must also implement reasonable policies and procedures under § 164.514(h) to verify the identity of any person who requests protected health information, as well as implement reasonable safeguards under § 164.530(c) to protect the information that is used or disclosed. For example, reasonable safeguards would not require the covered entity to confirm that the individual provided the correct email address of the third party, but would require reasonable procedures to ensure that the covered entity correctly enters the email address into its system. sroberts on DSK5SPTVN1PROD with c. Fees Proposed Rule Section 164.524(c)(4) of the Privacy Rule currently permits a covered entity to impose a reasonable, cost-based fee for a copy of protected health information (or a summary or explanation of such information). However, such a fee may only include the cost of: (1) The supplies for, and labor of, copying the protected health information; (2) the postage associated with mailing the protected health information, if applicable; and (3) the preparation of an explanation or summary of the protected health information, if agreed to by the individual. With respect to providing a copy (or summary or explanation) of protected health information from an EHR in electronic form, however, section 13405(e)(2) of the HITECH Act provides that a covered entity may not charge more than its labor costs in responding to the request for the copy. In response to section 13405(e)(2) of the HITECH Act, we proposed to amend § 164.524(c)(4)(i) to identify separately the labor for copying protected health information, whether in paper or electronic form, as one factor that may be included in a reasonable cost-based fee. While we did not propose more detailed considerations for this factor within the regulatory text, we retained all prior interpretations of labor with respect to paper copies—that is, that the labor cost of copying may not include the costs associated with searching for and retrieving the requested information. With respect to electronic copies, we asserted that a reasonable VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 cost-based fee includes costs attributable to the labor involved to review the access request and to produce the electronic copy, which we expected would be negligible. However, we did not consider a reasonable costbased fee to include a standard ‘‘retrieval fee’’ that does not reflect the actual labor costs associated with the retrieval of the electronic information or that reflects charges that are unrelated to the individual’s request (e.g., the additional labor resulting from technical problems or a workforce member’s lack of adequate training). We invited public comment on this aspect of our rulemaking, specifically with respect to what types of activities related to managing electronic access requests should be compensable aspects of labor. We also proposed to amend § 164.524(c)(4)(ii) to provide separately for the cost of supplies for creating the paper copy or electronic media (i.e., physical media such as a compact disc (CD) or universal serial bus (USB) flash drive), if the individual requests that the electronic copy be provided on portable media. This reorganization and the addition of the phrase ‘‘electronic media’’ reflected our understanding that since section 13405(e)(2) of the HITECH Act permits only the inclusion of labor costs in the charge for electronic copies, it by implication excludes charging for the supplies that are used to create an electronic copy of the individual’s protected health information, such as the hardware (computers, scanners, etc.) or software that is used to generate an electronic copy of an individual’s protected health information in response to an access request. We noted that this limitation is in contrast to a covered entity’s ability to charge for supplies for hard copies of protected health information (e.g., the cost of paper, the prorated cost of toner and wear and tear on the printer). See 65 FR 82462, 82735, Dec. 28, 2000 (responding to a comment seeking clarification on ‘‘capital cost for copying’’ and other supply costs by indicating that a covered entity was free to recoup all of their reasonable costs for copying). We asserted that this interpretation was consistent with the fact that, unlike a hard copy, which generally exists on paper, an electronic copy exists independent of media, and can be transmitted securely via multiple methods (e.g., email, a secure web-based portal, or an individual’s own electronic media) without accruing any ancillary supply costs. We also noted, however, that our interpretation of the statute would permit a covered entity to charge a reasonable and cost-based fee for any PO 00000 Frm 00071 Fmt 4701 Sfmt 4700 5635 electronic media it provided, as requested or agreed to by an individual. While we proposed to renumber the remaining factors at § 164.524(c)(4), we did not propose to amend their substance. With respect to § 164.524(c)(4)(iii), however, we noted that our interpretation of the statute would permit a covered entity to charge for postage if an individual requests that the covered entity transmit portable media containing an electronic copy through mail or courier (e.g., if the individual requests that the covered entity save protected health information to a CD and then mail the CD to a designee). Overview of Public Comments Commenters generally supported and appreciated the inclusion of a reasonable, cost-based fee that includes both labor and, in some cases, supply costs to support the new electronic access requirement. Several commenters disagreed that the cost related to reviewing and responding to requests would be negligible, particularly if the scope includes information in designated record sets and not only EHRs, since more technically trained staff would be necessary to perform this function. Commenters provided many suggestions of costs that should be permitted in the fees, including those associated with labor, materials, systems, retrieval (particularly for old data maintained in archives, backup media or legacy systems), copying, transmission, and capital to recoup the significant investments made for data access, storage and infrastructure. Commenters offered additional suggestions on labor-related costs, including: skilled technical staff time; time spent recovering, compiling, extracting, scanning and burning protected health information to media, and distributing the media; and preparation of an explanation or summary if appropriate. Suggestions of materials-related costs included: CDs, flash drives, tapes or other portable media; new types of technology needed to comply with individual requests; office supplies; and mail copies. Systems-related costs included: software necessary to conduct protected health information searches; and implementation and maintenance of security systems and secure connectivity. Final Rule The final rule adopts the proposed amendment at § 164.524(c)(4)(i) to identify separately the labor for copying protected health information, whether E:\FR\FM\25JAR2.SGM 25JAR2 sroberts on DSK5SPTVN1PROD with 5636 Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations in paper or electronic form, as one factor that may be included in a reasonable cost-based fee. We acknowledge commenters’ assertions that the cost related to searching for and retrieving electronic protected health information in response to requests would be not be negligible, as opposed to what we had anticipated, particularly in regards to designated record set access that will require more technically trained staff to perform this function. We clarify that labor costs included in a reasonable cost-based fee could include skilled technical staff time spent to create and copy the electronic file, such as compiling, extracting, scanning and burning protected health information to media, and distributing the media. This could also include the time spent preparing an explanation or summary of the protected health information, if appropriate. The final rule also adopts the proposed amendment at § 164.524(c)(4)(ii) to provide separately for the cost of supplies for creating the paper copy or electronic media (i.e., physical media such as a compact disc (CD) or universal serial bus (USB) flash drive), if the individual requests that the electronic copy be provided on portable media. We do not require that covered entities obtain new types of technology needed to comply with specific individual requests, and therefore the cost of obtaining such new technologies is not a permissible fee to include in the supply costs. With respect to § 164.524(c)(4)(iii), we clarify that a covered entity is permitted to charge for postage if an individual requests that the covered entity transmit portable media containing an electronic copy through mail or courier (e.g., if the individual requests that the covered entity save protected health information to a CD and then mail the CD to a designee). Fees associated with maintaining systems and recouping capital for data access, storage and infrastructure are not considered reasonable, cost-based fees, and are not permissible to include under this provision. Covered entities are not required to adopt or purchase new systems under this provision, and thus any costs associated with maintaining them are present regardless of the new electronic access right. Additionally, although the proposed rule indicated that a covered entity could charge for the actual labor costs associated with the retrieval of electronic information, in this final rule we clarify that a covered entity may not charge a retrieval fee (whether it be a standard retrieval fee or one based on actual retrieval costs). This VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 interpretation will ensure that the fee requirements for electronic access are consistent with the requirements for hard copies, which do not allow retrieval fees for locating the data. Response to Other Public Comments Comment: Commenters requested clarification on how to proceed when State laws designate fees. Response: When a State law provides a limit on the fee that a covered entity may charge for a copy of protected health information, this is relevant in determining whether a covered entity’s fee is ‘‘reasonable’’ under § 164.524(c)(4). A covered entity’s fee must be both reasonable and cost-based. For example, if a State permits a charge of 25 cents per page, but a covered entity is able to provide an electronic copy at a cost of five cents per page, then the covered entity may not charge more than five cents per page (since that is the reasonable and cost-based amount). Similarly, if a covered entity’s cost is 30 cents per page but the State law limits the covered entity’s charge to 25 cents per page, then the covered entity may not charge more than 25 cents per page (since charging 30 cents per page would be the cost-based amount, but would not be reasonable in light of the State law). Comment: One commenter suggested that labor-related costs should include preparation of an affidavit certifying that the information is a true and correct copy of the records. Response: We do not consider the cost to prepare an affidavit to be a copying cost. Thus, where an individual requests that an affidavit accompany the copy of protected health information requested by the individual for litigation purposes or otherwise, a covered entity may charge the individual for the preparation of such affidavit and is not subject to the reasonable, cost-based fee limitations of § 164.524(c)(4). However, a covered entity may not withhold an individual’s copy of his or her protected health information for failure by the individual to pay any fees for services above and beyond the copying, such as for preparing an affidavit. Comment: Some commenters recommended defining the following terms: ‘‘preparing,’’ ‘‘producing,’’ and ‘‘transmitting.’’ Response: We decline to define the terms ‘‘preparing,’’ ‘‘producing,’’ and ‘‘transmitting,’’ as we believe the terms have been adequately understood and utilized in the context of hard copy access to protected health information. PO 00000 Frm 00072 Fmt 4701 Sfmt 4700 d. Timeliness Proposed Rule We requested comment on one aspect of the right to access and obtain a copy of protected health information which the HITECH Act did not amend. In particular, the HITECH Act did not change the timeliness requirements for provision of access at § 164.524(b). Under the current requirements, a request for access must be approved or denied, and if approved, access or a copy of the information provided, within 30 days of the request. In cases where the records requested are only accessible from an off-site location, the covered entity has an additional 30 days to respond to the request. In extenuating circumstances where access cannot be provided within these timeframes, the covered entity may have a one-time 30day extension if the individual is notified of the need for the extension within the original timeframes. With regard to the timeliness of the provision of access, we recognized that with the advance of EHRs, there is an increasing expectation and capacity to provide individuals with almost instantaneous electronic access to the protected health information in those records through personal health records or similar electronic means. On the other hand, we did not propose to limit the right to electronic access of protected health information to certified EHRs, and the variety of electronic systems that are subject to this proposed requirement would not all be able to comply with a timeliness standard based on personal health record capabilities. It was our assumption that a single timeliness standard that would address a variety of electronic systems, rather than having a multitude of standards based on system capacity, would be the preferred approach to avoid workability issues for covered entities. Even under a single standard, nothing would prevent users of EHR systems from exceeding the Privacy Rule’s timeliness requirements for providing access to individuals. Additionally, the Medicare and Medicaid EHR Incentive Programs (the ‘‘meaningful use’’ programs) require users of Certified EHR Technology to provide individuals with expedited access to information. Based on the assumption that a single standard would be the preferred approach under the Privacy Rule, we requested public comment on an appropriate, common timeliness standard for the provision of access by covered entities with electronic designated record sets generally. We specifically requested comment on aspects of existing systems E:\FR\FM\25JAR2.SGM 25JAR2 Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations sroberts on DSK5SPTVN1PROD with that would create efficiencies in processing of requests for electronic information, as well as those aspects of electronic systems that would provide little change from the time required for processing a paper record. Alternatively, we requested comment on whether the current standard could be altered for all systems, paper and electronic, such that all requests for access should be responded to without unreasonable delay and not later than 30 days. We also requested public comment on whether, contrary to our assumption, a variety of timeliness standards based on the type of electronic designated record set is the preferred approach and if so, how such an approach should be implemented. Finally, we requested comment on the time necessary for covered entities to review access requests and make necessary determinations, such as whether the granting of access would endanger the individual or other persons so as to better understand how the time needed for these reviews relates to the overall time needed to provide the individual with access. Further, we requested comment generally on whether the provision which allows a covered entity an additional 30 days to provide access to the individual if the protected health information is maintained off-site should be eliminated altogether for both paper and electronic records, or at least for protected health information maintained or archived electronically because the physical location of electronic data storage is not relevant to its accessibility. Overview of Public Comments Commenters generally supported maintaining the same timeframe for response for both paper and electronic records and not modifying the existing timeframes for response. Commenters espoused many rationales for maintaining a single standard and the existing response standards, including that off-site electronic storage with backup tapes will require time to obtain the electronic media, multiple electronic systems may need to be accessed, some systems may not have data stored in useable formats requiring time to convert data, and time may be required to obtain data from business associates and subcontractors. Some commenters acknowledged that electronic records may be easier to access, but review of records and verification processes would still require time that cannot be shortcut because a record is electronic. One commenter acknowledged that shorter times may be achievable when specific VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 data set standards are established and covered entities have electronic records in place. One commenter believed that electronic records could be furnished in a much shorter timeframe, such as two business days. Several commenters suggested responses be done in much shorter timeframes, such as instantly, within one day or three days. One commenter noted that meaningful use standards required access within three days for 50 percent of patients. These commenters suggested alternative timeframes for adoption, such as allowing 60 days for response due to off-site storage issues and potential for multiple requests. One commenter suggested 30 and 60 day times were unworkable and another commenter suggested eliminating the 30 day extension for off-site record storage. One commenter suggested 30 days may be longer than is necessary, but cautioned against mandates that would unreasonably divert provider resources (e.g., five days would be unreasonable when a provider must take time to include explanatory notes). Final Rule The final rule modifies the timeliness requirements for right to access and to obtain a copy of protected health information at § 164.524(b). We remove the provision at § 164.524(b)(2)(ii) that permits 60 days for timely action when protected health information for access is not maintained or accessible to the covered entity on-site. We retain and renumber as necessary the provision at § 164.524(b)(2)(iii) that permits a covered entity a one-time extension of 30 days to respond to the individual’s request (with written notice to the individual of the reasons for delay and the expected date by which the entity will complete action on the request). We believe the 30 day timeframe for access is appropriate and achievable by covered entities given the increasing expectation and capacity to provide individuals with almost instantaneous electronic access to the protected health information in those records through personal health records or similar electronic means. While a covered entity is permitted 30 days to provide access (with a 30-day extension when necessary), we encourage covered entities to provide individuals with access to their information sooner, and to take advantage of technologies that provide individuals with immediate access to their health information. Nevertheless, for covered entities that continue to make use of off-site storage or have additional time constraints to providing access, the 30 day extension remains available for a covered entity to PO 00000 Frm 00073 Fmt 4701 Sfmt 4700 5637 exercise. This means, for example, that a covered entity must provide an individual with access to off-site records within 30 days of the individual’s request when possible, with a 30-day extension available (for a total of 60 days, in contrast to the current law that permits up to 90 days to provide the individual with access to such records). We decline to establish separate timeframes for timely access based upon whether the protected health information to be accessed is paper or electronic. Commenters generally supported adoption of a single standard rather than differing standards based upon whether a record is paper or electronic and no comments provided compelling reasons to establish differing standards. Response to Other Public Comments Comment: One commenter asked for clarification as to when the time period for responding to a response begins if the parties spend significant time attempting to reach agreement on the format of the electronic copy. Response: We confirm that the time period for responding to a request for access begins on the date of the request. Covered entities that spend significant time before reaching agreement on the electronic format for a response are using part of the 30 days permitted for response. Comment: One commenter suggested there should be a transition period for those covered entities that do not currently have the capability to meet the electronic access requirement. Response: We decline to implement a transition period for access to electronic copies of protected health information. Covered entities are already subject to the hard copy access requirement for all information held in designated record sets, including electronic designated record sets, and the new requirement for electronic copies gives covered entities the flexibility to provide an electronic copy in a form that is readily producible. We do not believe additional time is needed to provide electronic copies of protected health information that are readily producible. 11. Other Technical Changes and Conforming Changes Proposed Rule We proposed to make a number of technical and conforming changes to the Privacy Rule to fix minor problems, such as incorrect cross-references, mistakes of grammar, and typographical errors. These changes are shown in Table 3 below. E:\FR\FM\25JAR2.SGM 25JAR2 5638 Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations TABLE 3—TECHNICAL AND CONFORMING CHANGES Regulation section Current language Proposed change 164.510(b)(2)(iii) .................. ‘‘based the exercise of professional Judgment’’. ‘‘Permitted disclosures’’ and ‘‘may disclose’’. Insert ‘‘on’’ after ‘‘based’’ ................. Correct typographical error. Insert ‘‘uses and’’ and ‘‘use or’’ before ‘‘disclosures’’ and ‘‘disclose,’’ respectively. Change ‘‘protecting’’ to ‘‘protected’’ Correct inadvertent omission. 164.512(b)(1) ...................... 164.512(e)(1)(iii) .................. sroberts on DSK5SPTVN1PROD with 164.512(e)(1)(vi) .................. 164.512(k)(3) ....................... ‘‘seeking protecting health information’’. ‘‘paragraph (e)(1)(iv) of this section’’ ‘‘authorized by 18 U.S.C. 3056, or to foreign heads of state, or to for the conduct of investigations’’. In addition to the above technical changes, we proposed to make a few clarifications to existing text in various provisions of the regulation not otherwise addressed in the above preamble. These are as follows. 1. Section 164.506(c)(5) permits a covered entity to disclose protected health information ‘‘to another covered entity that participates in the organized health care arrangement.’’ We proposed to change the words ‘‘another covered entity that participates’’ to ‘‘other participants’’ because not all participants in an organized health care arrangement may be covered entities; for example, some physicians with staff privileges at a hospital may not be covered entities. 2. Section 164.510(a)(1)(ii) permits the disclosure of directory information to members of the clergy and other persons who ask for the individual by name. We proposed to add the words ‘‘use or’’ to this permission, to cover the provision of such information to clergy who are part of a facility’s workforce. 3. Section 164.510(b)(3) covers uses and disclosures of protected health information when the individual is not present to agree or object to the use or disclosure, and, as pertinent here, permits disclosure to persons only of ‘‘the protected health information that is directly relevant to the person’s involvement with the individual’s health care.’’ We proposed to delete the last two quoted words and substitute the following: ‘‘care or payment related to the individual’s health care or needed for notification purposes.’’ This change aligns the text of paragraph (b)(3) with the permissions provided for at paragraph (b)(1) of this section. 4. Where an employer needs protected health information to comply with workplace medical surveillance laws, such as the Occupational Safety and Health Administration or Mine Safety and Health Administration requirements, § 164.512(b)(1)(v)(A) permits a covered entity to disclose, VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 Reason for change Change ‘‘(e)(1)(iv)’’ to ‘‘(e)(1)(v)’’ ..... Remove the comma after ‘‘U.S.C. 3056’’ and the ‘‘to’’ before ‘‘for’’. Correct typographical error. Correct cross-reference. Correct typographical errors. subject to certain conditions, protected health information of an individual to the individual’s employer if the covered entity is a covered health care provider ‘‘who is a member of the workforce of such employer or who provides health care to the individual at the request of the employer.’’ We proposed to amend the quoted language by removing the words ‘‘who is a member of the workforce of such employer or,’’ as the language is unnecessary. 5. At § 164.512(k)(1)(ii), we proposed to replace the word ‘‘Transportation’’ with ‘‘Homeland Security.’’ The language regarding a component of the Department of Transportation was included to refer to the Coast Guard; however, the Coast Guard was transferred to the Department of Homeland Security in 2003. 6. At § 164.512(k)(5), which permits a covered entity to disclose to a correctional institution or law enforcement official having lawful custody of an inmate or other individual protected health information about the inmate or individual in certain necessary situations, we proposed to replace the word ‘‘and’’ after the semicolon in paragraph (i)(E) with the word ‘‘or.’’ The intent of § 164.512(k)(5)(i) is not that the existence of all of the conditions is necessary to permit the disclosure, but rather that the existence of any would permit the disclosure. OHCA may include only professional staff members. Overview of Public Comments One commenter requested clarification about whether business associates may participate in an organized health care arrangement (OHCA) under § 164.506(c)(5). Another commenter recommended against changing the language of § 164.506(c)(5), arguing that such a change could bring entities like employers and pharmaceutical companies into OHCAs that should not otherwise have access to protected health information, and suggested that the Department change the language to make clear that an V. Modifications to the Breach Notification Rule Under the HITECH Act PO 00000 Frm 00074 Fmt 4701 Sfmt 4700 Final Rule The final rule implements the technical, conforming, and clarifying changes as proposed. In response to the comments regarding which entities may participate in an OHCA, we clarify that a covered entity participating in an OHCA or the OHCA itself may contract with a business associate to provide certain functions, activities, or services on its behalf that involve access to protected health information, provided the applicable requirements of §§ 164.502(e), 164.504(e), 164.308(b) and 164.314(a) are met. Further, the definition of an organized health care arrangement (OHCA) at § 160.103 includes a clinically integrated care setting in which individuals typically receive health care from more than one health care provider. We modified § 164.506(c)(5) as discussed above in recognition of the fact that not all participants in a clinically integrated care setting may be covered entities (e.g., hospital with physicians with staff privileges that are not workforce members). Such change does not permit employers and pharmaceutical representatives to receive access to protected health information from or through an OHCA in a manner they would otherwise be prohibited from now. A. Background Section 13402 of the HITECH Act requires HIPAA covered entities to provide notification to affected individuals and to the Secretary of HHS following the discovery of a breach of unsecured protected health information. In some cases, the Act requires covered entities also to provide notification to the media of breaches. In the case of a breach of unsecured protected health E:\FR\FM\25JAR2.SGM 25JAR2 sroberts on DSK5SPTVN1PROD with Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations information at or by a business associate of a covered entity, the Act requires the business associate to notify the covered entity of the breach. Finally, the Act requires the Secretary to post on an HHS Web site a list of covered entities that experience breaches of unsecured protected health information involving more than 500 individuals. Section 13400(1) of the Act defines ‘‘breach’’ to mean, generally, the unauthorized acquisition, access, use, or disclosure of protected health information which compromises the security or privacy of such information. The Act includes three exceptions to this definition to encompass situations Congress clearly intended not to constitute breaches: (1) Unintentional acquisition, access, or use of protected health information by an employee or other person acting under the authority of a covered entity or business associate if such acquisition, access, or use was made in good faith and within the course and scope of the employment or other professional relationship of such person with the covered entity or business associate and such information is not further acquired, accessed, used, or disclosed by any person (section 13400(1)(B)(i)); (2) inadvertent disclosure of protected health information from one person authorized to access protected health information at a facility operated by a covered entity or business associate to another person similarly situated at the same facility and the information received is not further acquired, accessed, used or disclosed without authorization by any person (section 13400(1)(B)(ii) and (iii)); and (3) unauthorized disclosures in which an unauthorized person to whom protected health information is disclosed would not reasonably have been able to retain the information (section 13400(1)(A)). Further, section 13402(h) of the Act defines ‘‘unsecured protected health information’’ as ‘‘protected health information that is not secured through the use of a technology or methodology specified by the Secretary in guidance’’ and provides that the guidance specify the technologies and methodologies that render protected health information unusable, unreadable, or indecipherable to unauthorized individuals. Covered entities and business associates that implement the specified technologies and methodologies with respect to protected health information are not required to provide notifications in the event of a breach of such information— that is, the information is not considered ‘‘unsecured’’ in such cases. As required by the Act, the Secretary initially issued this guidance on April VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 17, 2009 (it was subsequently published at 74 FR 19006 on April 27, 2009). The guidance listed and described encryption and destruction as the two technologies and methodologies for rendering protected health information unusable, unreadable, or indecipherable to unauthorized individuals. In cases in which notification is required, the Act at section 13402 prescribes the timeliness, content, and methods of providing the breach notifications. Section 13402 required HHS to issue within 180 days of enactment interim final regulations to implement these breach notification requirements. The Department issued an interim final rule on August 24, 2009, with a 60-day public comment period (74 FR 42740). The interim final rule became effective on September 23, 2009. In the preamble to the interim final rule, the Department also re-issued without substantive change its Guidance Specifying the Technologies and Methodologies That Render Protected Health Information Unusable, Unreadable, or Indecipherable to Unauthorized Individuals that was initially issued on April 17, 2009. The Guidance continues to specify encryption and destruction as the two methods for rendering protected health information unusable, unreadable, or indecipherable to unauthorized individuals—or ‘‘secured’’—and thus, exempt from the breach notification obligations. See 74 FR 42741–43. B. Overview of the Interim Final Rule The interim final rule added a new subpart D to part 164 of title 45 of the Code of Federal Regulations (CFR) to implement the breach notification provisions of section 13402 of the HITECH Act. In developing the interim final rule, the Department consulted closely with the Federal Trade Commission (FTC), which administers similar breach notification requirements on vendors of personal health records (PHRs) and their third party service providers under section 13407 of the HITECH Act. The interim final rule and FTC’s Health Breach Notification Rule (74 FR 42962, published August 25, 2009) made clear that entities operating as HIPAA covered entities and business associates are subject to HHS’, and not the FTC’s, breach notification rule. Second, to address those limited cases where an entity may be subject to both HHS’ and the FTC’s rules, such as a vendor that offers PHRs to customers of a HIPAA covered entity as a business associate and also offers PHRs directly to the public, both sets of regulations were harmonized by including the same PO 00000 Frm 00075 Fmt 4701 Sfmt 4700 5639 or similar language, within the constraints of the statutory language. The 60-day public comment period on the interim final rule closed on October 23, 2009. The Department received approximately 120 comments during the comment period from a variety of entities, including health care providers, hospital and medical associations, health plans, educational institutions, information technology companies, privacy and security advocates, consumer groups, state agencies, and several members of Congress. The provisions of the interim final rule are discussed in more detail below, along with the public comments received, and the provisions of this final rule. C. Section-by-Section Description of Final Rule and Response to Comments 1. Section 164.402—Definitions a. Definition of ‘‘Breach’’ Interim Final Rule Section 13400(1)(A) of the Act defines ‘‘breach’’ as the ‘‘unauthorized acquisition, access, use, or disclosure of protected health information which compromises the security or privacy of such information, except where an unauthorized person to whom such information is disclosed would not reasonably have been able to retain such information.’’ Section 13400(1)(B) of the Act provides two additional exceptions to the definition of ‘‘breach.’’ The interim final rule at 45 CFR 164.402 defined a ‘‘breach’’ to mean generally ‘‘the acquisition, access, use, or disclosure of protected health information in a manner not permitted [by the Privacy Rule] which compromises the security or privacy of the protected health information.’’ The definition included the statutory exceptions to the definition (discussed below) and clarified that ‘‘unauthorized’’ for purposes of the statute meant in a manner not permitted by the Privacy Rule. In addition, for purposes of this definition, the rule provided that ‘‘compromises the security or privacy of the protected health information’’ means poses a significant risk of financial, reputational, or other harm to the individual. The Department included this standard regarding a significant risk of harm to the individual (i.e., harm standard) after considering public comment received in response to the Department’s request for information on the HITECH Act’s breach notification provisions. See 74 FR 19006. The inclusion of the harm standard was intended to align the Department’s rule with many State E:\FR\FM\25JAR2.SGM 25JAR2 sroberts on DSK5SPTVN1PROD with 5640 Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations breach notification laws, as well as existing obligations on Federal agencies pursuant to OMB Memorandum M–07– 16, that have similar standards for triggering breach notification. In addition, the standard was intended to ensure that consumers were not flooded with breach notifications for inconsequential events, which could cause unnecessary anxiety and eventual apathy among consumers. To determine whether an impermissible use or disclosure of protected health information constitutes a breach under this standard, covered entities and business associates were required to perform a risk assessment to determine if there is a significant risk of harm to the individual as a result of the impermissible use or disclosure. In conducting the risk assessment, covered entities and business associates were to consider a number or combination of factors, including who impermissibly used the information or to whom the information was impermissibly disclosed; whether the covered entity or business associate had taken steps to mitigate or eliminate the risk of harm; whether the protected health information was actually accessed; and what type or amount of protected health information was impermissibly used or disclosed. The rule provided further that an impermissible use or disclosure of protected health information that qualifies as a limited data set but also excludes dates of birth and zip codes (both identifiers that may otherwise be included in a limited data set) does not compromise the security or privacy of the protected health information. The Department included this narrow exception in the belief that it would be very difficult to re-identify a limited data set that excludes dates of birth and zip codes. Thus, a breach of such information would pose a low level of risk of harm to an individual. The interim final rule also included the three statutory exceptions to the definition of breach. To implement section 13400(1)(B)(i) of the Act, the first regulatory exception provided that a breach excludes any unintentional acquisition, access, or use of protected health information by a workforce member or person acting under the authority of a covered entity or business associate, if such acquisition, access, or use was made in good faith and within the scope of authority and does not result in further use or disclosure in a manner not permitted by the Privacy Rule. We substituted the term ‘‘workforce members’’ for the statutory term ‘‘employees’’ because ‘‘workforce member’’ is a defined term for purposes VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 of the HIPAA Rules and means employees, volunteers, trainees, and other persons whose conduct, in the performance of work for a covered entity or business associate, is under the direct control of such covered entity or business associate. In addition to unintentional, good faith access to protected health information by workforce members, this exception covers similar access by a business associate of a covered entity or subcontractor with respect to a business associate or other person acting on behalf of a covered entity or business associate. The exception does not, however, cover situations involving snooping employees, because access as a result of such snooping would be neither unintentional nor done in good faith. To implement section 13400(1)(B)(ii) and (iii) of the Act, the second regulatory exception provided that a breach excludes inadvertent disclosures of protected health information from a person who is authorized to access protected health information at a covered entity or business associate to another person authorized to access protected health information at the same covered entity, business associate, or organized health care arrangement in which the covered entity participates. The regulatory exception includes reference to an ‘‘organized health care arrangement’’ to capture, among other things, clinically integrated care settings in which individuals typically receive health care from more than one health care provider, such as a hospital, and the health care providers who have staff privileges at the hospital. In this regulatory exception, we also interpreted the statutory limitations that the disclosure be to ‘‘another person similarly situated at the same facility’’ to mean that the disclosure be to another person authorized to access protected health information (even if the two persons may not be authorized to access the same types of protected health information) at the same covered entity, business associate, or organized health care arrangement in which the covered entity participates (even if the covered entity, business associate, or organized health care arrangement has multiple facilities or locations across the country). Finally, to implement section 13400(1)(A) of the Act, the interim final rule exempted disclosures of protected health information where a covered entity or a business associate has a good faith belief that an unauthorized person to whom the disclosure was made would not reasonably have been able to retain such information. For example, if PO 00000 Frm 00076 Fmt 4701 Sfmt 4700 a covered entity, due to a lack of reasonable safeguards, sends a number of explanations of benefits (EOBs) to the wrong individuals and a few of the EOBs are returned by the post office, unopened, as undeliverable, the covered entity can conclude that the improper addressees could not reasonably have retained the information. The EOBs that were not returned as undeliverable, however, and that the covered entity knows were sent to the wrong individuals, should be treated as potential breaches. As another example, if a nurse mistakenly hands a patient the discharge papers belonging to another patient, but she quickly realizes her mistake and recovers the protected health information from the patient, this would not constitute a breach if the nurse can reasonably conclude that the patient could not have read or otherwise retained the information. With respect to any of the three exceptions discussed above, a covered entity or business associate has the burden of proof, pursuant to § 164.414(b) (discussed below), for showing why breach notification was not required. Accordingly, the covered entity or business associate must document why the impermissible use or disclosure falls under one of the above exceptions. Overview of Public Comments Of the approximately 85 public comments received on the interim final rule addressing the definition of breach, approximately 70 of those comments addressed the harm standard and risk assessment approach in the interim final rule. We received approximately 60 comments in support of the harm standard and the risk assessment approach. The commenters in support of this approach included providers, health plans, professional associations, and certain members of Congress. These commenters argued that the inclusion of the harm standard and accompanying risk assessment was consistent with the statutory language, aligned the interim final rule with many State breach notification laws and Federal policies, and appropriately placed the obligation to determine if a breach had occurred on covered entities and business associates since they had the requisite knowledge of the incident to best assess the likely impact of the impermissible use or disclosure. The proponents of the harm standard and risk assessment approach also argued that its removal would increase the cost and burden of implementing the rule for covered entities, business associates, as well as HHS, and may cause unnecessary anxiety and eventual E:\FR\FM\25JAR2.SGM 25JAR2 sroberts on DSK5SPTVN1PROD with Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations apathy among consumers if notifications are sent when there is no risk of harm to the individual. We also received approximately 10 comments opposed to the harm standard. Generally, the commenters opposed to this approach were members of Congress and consumer advocacy groups. Some opponents of the harm standard argued that its addition to the interim final rule set too high a bar for triggering breach notification, which was contrary to statutory intent. These commenters argued that the final rule should adopt a bright line standard for breach notification to ensure that individuals are aware of all impermissible uses and disclosures of their health information regardless of the potential risk and to make implementation and enforcement of the rule more uniform by removing the discretion and judgment given to covered entities in the interim final rule. These commenters argued that such transparency would better breed consumer trust and would allow individuals to assess the risk of harm themselves and take necessary measures to mitigate an impermissible use or disclosure of their health information. Other commenters, while opposed to a harm standard to trigger breach notification, nonetheless agreed that breach notification should not be required following every impermissible use or disclosure of unsecured protected health information no matter how inconsequential the breach. These commenters argued that, rather than a subjective standard measuring the risk of harm to an individual, the final rule should include a more objective standard against which entities would be required to assess risk. These commenters suggested that the risk assessment should focus on the risk that the protected health information was compromised instead of on the risk of harm to the individual. Additionally, these commenters proposed four factors that should be considered to determine whether the information was compromised: (1) To whom the information was impermissibly disclosed; (2) whether the information was actually accessed or viewed; (3) the potential ability of the recipient to identify the subjects of the data; and (4) in cases where the recipient is the disclosing covered entity’s business associate or is another covered entity, whether the recipient took appropriate mitigating action. Some commenters stated that the default function of the rule was unclear. In particular, these commenters questioned whether the rule required notification of a breach unless it is VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 determined that a significant risk of harm does not exist, or alternatively, required notification only in cases where significant risk of harm can be demonstrated. Other commenters suggested that we include in the definition an express presumption of a breach unless an entity can show otherwise. Additionally, many commenters responded to the treatment of limited data sets in the interim final rule. Although many commenters expressed support for the assertion that limited data sets that do not contain dates of birth and zip codes do not compromise the security or privacy of protected health information, most of these commenters expressed concern that the interim final rule did not go far enough and should exempt even those limited data sets that contain dates of birth and/ or zip codes from the breach notification requirements. These commenters argued that no impermissible use or disclosure of a limited data set should trigger breach notification obligations because without the 16 direct identifiers that the Privacy Rule requires to be stripped from the information, there is minimal risk of harm to the individual. Additionally, commenters indicated it would be costly and burdensome for entities to have to re-identify the information in a limited data set to provide notification and that reidentifying the information could also pose an additional risk of harm to the affected individuals. Finally, other commenters noted that because researchers commonly rely on limited data sets that contain dates of birth and zip codes, researchers would not be able to take advantage of the exception for certain limited data sets in the interim final rule, which may have the effect of deterring research. In contrast, some commenters expressed concern regarding the inclusion of even the limited exception to the definition of breach for limited data sets that do not include dates of birth and zip codes. These commenters supported requiring entities to perform a risk assessment to determine whether an impermissible use or disclosure of such information compromised the security or privacy of the information, as there may be a risk of reidentification of this information depending on who received the information. Final Rule After considering the public comments on the definition, the Department in this final rule amends the definition of ‘‘breach’’ at 45 CFR 164.402. Based on the comments, we PO 00000 Frm 00077 Fmt 4701 Sfmt 4700 5641 recognize that the language used in the interim final rule and its preamble could be construed and implemented in manners we had not intended. Accordingly, this final rule modifies and clarifies the definition of breach and the risk assessment approach outlined in the interim final rule. First, we have added language to the definition of breach to clarify that an impermissible use or disclosure of protected health information is presumed to be a breach unless the covered entity or business associate, as applicable, demonstrates that there is a low probability that the protected health information has been compromised. We recognize that some persons may have interpreted the risk of harm standard in the interim final rule as setting a much higher threshold for breach notification than we intended to set. As a result, we have clarified our position that breach notification is necessary in all situations except those in which the covered entity or business associate, as applicable, demonstrates that there is a low probability that the protected health information has been compromised (or one of the other exceptions to the definition of breach applies). We believe that the express statement of this presumption in the final rule will help ensure that all covered entities and business associates interpret and apply the regulation in a uniform manner and also responds to commenters that indicated the default function of the rule was unclear. This new language is also consistent with § 164.414, which provides that covered entities and business associates have the burden of proof to demonstrate that all notifications were provided or that an impermissible use or disclosure did not constitute a breach (such as by demonstrating through a risk assessment that there was a low probability that the protected health information had been compromised) and must maintain documentation sufficient to meet that burden of proof. Second, to further ensure that this provision is applied uniformly and objectively by covered entities and business associates, we have removed the harm standard and modified the risk assessment to focus more objectively on the risk that the protected health information has been compromised. Thus, breach notification is not required under the final rule if a covered entity or business associate, as applicable, demonstrates through a risk assessment that there is a low probability that the protected health information has been compromised, rather than demonstrate that there is no significant risk of harm to the individual as was provided under E:\FR\FM\25JAR2.SGM 25JAR2 sroberts on DSK5SPTVN1PROD with 5642 Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations the interim final rule. The final rule also identifies the more objective factors covered entities and business associates must consider when performing a risk assessment to determine if the protected health information has been compromised and breach notification is necessary. Although some commenters urged us to implement a bright line standard, requiring notification for all impermissible uses and disclosures without any assessment of risk, we believe that a risk assessment is necessary. The statute acknowledges, by including a specific definition of breach and identifying exceptions to this definition, as well as by providing that an unauthorized acquisition, access, use, or disclosure of protected health information must compromise the security or privacy of such information to be a breach, that there are several situations in which unauthorized acquisition, access, use, or disclosure of protected health information is so inconsequential that it does not warrant notification. In addition to the statutory exceptions that have been included in both the interim final rule and this final rule, there may be other similar situations that do not warrant breach notification. We agree with commenters that providing notification in such cases may cause the individual unnecessary anxiety or even eventual apathy if notifications of these types of incidents are sent routinely. For example, if a covered entity misdirects a fax containing protected health information to the wrong physician practice, and upon receipt, the receiving physician calls the covered entity to say he has received the fax in error and has destroyed it, the covered entity may be able to demonstrate after performing a risk assessment that there is a low risk that the protected health information has been compromised. Although this scenario does not fit into any of the statutory or regulatory exceptions, we believe that, like the exceptions to breach, notification should not be required if the covered entity demonstrates a low probability that the data has been compromised. Commenters argued that a rule containing a bright line standard for notification would be easier for both the regulated entities to implement and for HHS to enforce. We disagree. Although a rule that required notification following every impermissible use or disclosure may appear easier for covered entities and business associates to implement—as no determination of the risk that the protected health information has been compromised would be required—in effect, a bright VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 line standard would be extremely burdensome and costly for entities to implement. With no risk assessment following an impermissible use or disclosure, entities may be required to provide many notices each year for incidents that did not compromise the security or privacy of an individual’s protected health information. Although we do not believe a bright line approach to breach notification is appropriate, we do agree with the commenters who expressed concern that the risk assessment focus on ‘‘harm to an individual’’ in the interim final rule was too subjective and would lead to inconsistent interpretations and results across covered entities and business associates. As a result, instead of assessing the risk of harm to the individual, covered entities and business associates must assess the probability that the protected health information has been compromised based on a risk assessment that considers at least the following factors: (1) The nature and extent of the protected health information involved, including the types of identifiers and the likelihood of re-identification; (2) the unauthorized person who used the protected health information or to whom the disclosure was made; (3) whether the protected health information was actually acquired or viewed; and (4) the extent to which the risk to the protected health information has been mitigated. We believe that the use of these factors, which are derived from the factors listed in the interim final rule as well as many of the factors suggested by commenters, will result in a more objective evaluation of the risk to the protected health information and a more uniform application of the rule. As we have modified and incorporated the factors that must be considered when performing a risk assessment into the regulatory text, covered entities and business associates should examine their policies to ensure that when evaluating the risk of an impermissible use or disclosure they consider all of the required factors. In addition, given the circumstances of the impermissible use or disclosure, additional factors may need to be considered to appropriately assess the risk that the protected health information has been compromised. We note that, although we have included this risk assessment in the final rule, this type of assessment of risk should not be a new or different exercise for covered entities and business associates. Similar assessments of risk that data have been compromised must be performed routinely following security PO 00000 Frm 00078 Fmt 4701 Sfmt 4700 breaches and to comply with certain State breach notification laws. The first factor requires covered entities and business associates to evaluate the nature and the extent of the protected health information involved, including the types of identifiers and the likelihood of re-identification of the information. To assess this factor, entities should consider the type of protected health information involved in the impermissible use or disclosure, such as whether the disclosure involved information that is of a more sensitive nature. For example, with respect to financial information, this includes credit card numbers, social security numbers, or other information that increases the risk of identity theft or financial fraud. With respect to clinical information, this may involve considering not only the nature of the services or other information 11 but also the amount of detailed clinical information involved (e.g., treatment plan, diagnosis, medication, medical history information, test results). Considering the type of protected health information involved in the impermissible use or disclosure will help entities determine the probability that the protected health information could be used by an unauthorized recipient in a manner adverse to the individual or otherwise used to further the unauthorized recipient’s own interests. Additionally, in situations where there are few, if any, direct identifiers in the information impermissibly used or disclosed, entities should determine whether there is a likelihood that the protected health information released could be reidentified based on the context and the ability to link the information with other available information.12 For example, if a covered entity impermissibly disclosed a list of patient names, addresses, and hospital identification numbers, the protected health information is obviously identifiable, and a risk assessment likely would determine that there is more than a low probability that the information has been compromised, dependent on an assessment of the other factors discussed below. Alternatively, if the covered entity disclosed a list of patient discharge dates and diagnoses, the 11 We caution that many forms of health information, not just information about sexually transmitted diseases or mental health or substance abuse, are sensitive. 12 Information that has been de-identified in accordance with 45 CFR 164.514(a)–(c) is not protected health information, and thus, any inadvertent or unauthorized use or disclosure of such information is not considered a breach for purposes of this rule. E:\FR\FM\25JAR2.SGM 25JAR2 sroberts on DSK5SPTVN1PROD with Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations entity would need to consider whether any of the individuals could be identified based on the specificity of the diagnosis, the size of the community served by the covered entity, or whether the unauthorized recipient of the information may have the ability to combine the information with other available information to re-identify the affected individuals (considering this factor in combination with the second factor discussed below). We emphasize, however, that the entity must evaluate all the factors, including those discussed below, before making a determination about the probability of risk that the protected health information has been compromised. The second factor requires covered entities and business associates to consider the unauthorized person who impermissibly used the protected health information or to whom the impermissible disclosure was made. Entities should consider whether the unauthorized person who received the information has obligations to protect the privacy and security of the information. For example, as discussed in the interim final rule, if protected health information is impermissibly disclosed to another entity obligated to abide by the HIPAA Privacy and Security Rules or to a Federal agency obligated to comply with the Privacy Act of 1974 and the Federal Information Security Management Act of 2002, there may be a lower probability that the protected health information has been compromised since the recipient of the information is obligated to protect the privacy and security of the information in a similar manner as the disclosing entity. We also emphasize that this factor should be considered in combination with the factor discussed above regarding the risk of reidentification. If the information impermissibly used or disclosed is not immediately identifiable, entities should determine whether the unauthorized person who received the protected health information has the ability to re-identify the information. For example, if information containing dates of health care service and diagnoses of certain employees was impermissibly disclosed to their employer, the employer may be able to determine that the information pertains to specific employees based on other information available to the employer, such as dates of absence from work. In this case, there may be more than a low probability that the protected health information has been compromised. Several commenters suggested that a risk assessment need be completed following only impermissible VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 disclosures of protected health information, since information impermissibly ‘‘used’’ remains within the covered entity or business associate. We disagree. The final rule requires a risk assessment to be performed following both impermissible uses and disclosures (that do not otherwise fall within the other enumerated exceptions to breach). However, the fact that information only is impermissibly used within a covered entity or business associate and the impermissible use does not result in further impermissible disclosure outside the entity, is something that may be taken into account in conducting the risk assessment and may reduce the probability that the protected health information has been compromised. The third factor requires covered entities and business associates to investigate an impermissible use or disclosure to determine if the protected health information was actually acquired or viewed or, alternatively, if only the opportunity existed for the information to be acquired or viewed. For example, as we discussed in the interim final rule, if a laptop computer was stolen and later recovered and a forensic analysis shows that the protected health information on the computer was never accessed, viewed, acquired, transferred, or otherwise compromised, the entity could determine that the information was not actually acquired by an unauthorized individual even though the opportunity existed. In contrast, however, if a covered entity mailed information to the wrong individual who opened the envelope and called the entity to say that she received the information in error, then, in this case, the unauthorized recipient viewed and acquired the information because she opened and read the information to the extent that she recognized it was mailed to her in error. The final factor included in the final rule requires covered entities and business associates to consider the extent to which the risk to the protected health information has been mitigated. Covered entities and business associates should attempt to mitigate the risks to the protected health information following any impermissible use or disclosure, such as by obtaining the recipient’s satisfactory assurances that the information will not be further used or disclosed (through a confidentiality agreement or similar means) or will be destroyed, and should consider the extent and efficacy of the mitigation when determining the probability that the protected health information has been compromised. We note that this PO 00000 Frm 00079 Fmt 4701 Sfmt 4700 5643 factor, when considered in combination with the factor regarding the unauthorized recipient of the information discussed above, may lead to different results in terms of the risk to the protected health information. For example, a covered entity may be able to obtain and rely on the assurances of an employee, affiliated entity, business associate, or another covered entity that the entity or person destroyed information it received in error, while such assurances from certain third parties may not be sufficient. As described above, certain commenters suggested that mitigation should only be considered where the recipient of the information is a business associate of the covered entity or another covered entity. We do not in this rule limit this factor to those circumstances but, as discussed above, acknowledge that the recipient of the information will have an impact on whether the covered entity can conclude that an impermissible use or disclosure has been appropriately mitigated. A covered entity’s or business associate’s analysis of the probability that protected health information has been compromised following an impermissible use or disclosure must address each factor discussed above. Other factors may also be considered where necessary. Covered entities and business associates must then evaluate the overall probability that the protected health information has been compromised by considering all the factors in combination, and we expect these risk assessments to be thorough, completed in good faith, and for the conclusions reached to be reasonable. If an evaluation of the factors discussed above fails to demonstrate that there is a low probability that the protected health information has been compromised, breach notification is required. We do note, however, that a covered entity or business associate has the discretion to provide the required notifications following an impermissible use or disclosure of protected health information without performing a risk assessment. Because the final rule clarifies the presumption that a breach has occurred following every impermissible use or disclosure of protected health information, entities may decide to notify without evaluation of the probability that the protected health information has been compromised. In the future, we will issue additional guidance to aid covered entities and business associates in performing risk assessments with respect to frequently occurring scenarios. E:\FR\FM\25JAR2.SGM 25JAR2 sroberts on DSK5SPTVN1PROD with 5644 Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations In addition to the removal of the harm standard and the creation of more objective factors to evaluate the probability that protected health information has been compromised, we have removed the exception for limited data sets that do not contain any dates of birth and zip codes. In the final rule, following the impermissible use or disclosure of any limited data set, a covered entity or business associate must perform a risk assessment that evaluates the factors discussed above to determine if breach notification is not required. The vast majority of commenters were not supportive of the exception for certain limited data sets outlined in the interim final rule, either because they believed the exception did not go far enough and would chill research that needed access to birth dates and zip codes in limited data sets, or because of concerns regarding the re-identifiability of the limited information to which the exception applied. Based on the comments, we believe it is appropriate to require the impermissible use or disclosure of a limited data set, even those that do not contain dates of birth and zip codes, to be subject to a risk assessment to demonstrate that breach notification is not required. The final rule expressly includes a factor that would require consideration of the reidentifiability of the information, as well a factor that requires an assessment of the unauthorized person who used the protected health information or to whom the disclosure was made (i.e., whether this person has the ability to reidentify the affected individuals). Thus, the factors are particularly suited to address the probability that a data set without direct identifiers has been compromised following an impermissible use or disclosure. Further, we believe in most cases that the result would be the same under this final rule as under the interim final rule with respect to whether an impermissible use or disclosure of a limited data set that also excludes dates of birth and zip codes constitutes a breach for which notification is required. Due to the lack of identifiers present in the protected health information, entities may reasonably determine that there is a low probability of risk that the information has been compromised; however, we stress that this is a fact specific determination to be made based on the circumstances of the impermissible use or disclosure. We encourage covered entities and business associates to take advantage of the safe harbor provision of the breach notification rule by encrypting limited data sets and other protected health VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 information pursuant to the Guidance Specifying the Technologies and Methodologies that Render Protected Health Information Unusable, Unreadable, or Indecipherable to Unauthorized Individuals (74 FR 42740, 42742). If protected health information is encrypted pursuant to this guidance, then no breach notification is required following an impermissible use or disclosure of the information. In addition to the comments discussed above, it was suggested that covered entities be required to include in their notice of privacy practices information about how a risk assessment will be conducted or their internal policies for determining whether a breach has occurred and notification is warranted. It was also suggested that the breach notice to the individual following discovery of a breach of unsecured protected health information contain information about the covered entity or business associate’s risk assessment to help the individual better assess the level of threat posed by the breach and to better determine the appropriate steps, if any, to take. We decline to require that the covered entity’s notice of privacy practices include a description of how a risk assessment will be conducted, although covered entities may include such information in their notice of privacy practices if they choose. While each risk assessment will differ depending on the specific facts and circumstances surrounding the impermissible use or disclosure, we believe that the modifications in this final rule will help ensure that covered entities and business associates perform risk assessments more uniformly and objectively. We also note that the content requirements for the notice to the individual outlined in § 164.404(c) already require that the individual be notified of the circumstances of a breach, as well as what steps individuals should take to protect themselves from potential harm resulting from the breach. One commenter suggested that we require a covered entity to hire an independent organization to assess the risk of an impermissible use or disclosure to determine if breach notification is required. We do not believe such a requirement is necessary, although covered entities are free to engage independent organizations to assist in making such determinations provided that, if access to protected health information is required, business associate agreements are entered into to protect the information. Further, we believe the modifications in this final PO 00000 Frm 00080 Fmt 4701 Sfmt 4700 rule are conducive to more uniform risk assessments across covered entities and business associates. Additionally, as with the interim final rule, we note that covered entities and business associates have the burden of proof, pursuant to § 164.414, to demonstrate that all notifications were provided or that an impermissible use or disclosure did not constitute a breach and to maintain documentation (e.g., of the risk assessment demonstrating that there was a low probability that the protected health information had been compromised or of the assessment that the impermissible use or disclosure falls within one of the other exceptions to breach), pursuant to 45 CFR 164.530(j)(1)(iv), as necessary to meet this burden of proof. Thus, covered entities and business associates have adequate incentive to conduct reasonable and diligent risk assessments. Finally, after reviewing and considering the comments received regarding the exceptions to the definition of breach in the interim final rule, the Department adopts these exceptions without modification in this final rule. Although the substance of these exceptions has not changed, these exceptions are now located at paragraph (1) of the definition of breach instead of paragraph (2) to accommodate the modifications discussed above. We respond to the public comments addressing these exceptions, as well as other comments received on the definition of ‘‘breach,’’ below. Response to Other Public Comments Comment: Many commenters expressed concern that violations of the minimum necessary standard may trigger breach notification obligations. Response: We do not believe it would be appropriate to exempt minimum necessary violations from the breach notification obligations as we do not believe that all minimum necessary violations present a low probability that the protected health information has been compromised. Thus, uses or disclosures that impermissibly involve more than the minimum necessary information, in violation of §§ 164.502(b) and 164.514(d), may qualify as breaches. Such incidents must be evaluated as any other impermissible uses or disclosures to determine whether breach notification is not required. As explained above, there are several factors to be considered when determining the probability that the protected health information involved in an impermissible use or disclosure has been compromised, including the E:\FR\FM\25JAR2.SGM 25JAR2 sroberts on DSK5SPTVN1PROD with Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations unauthorized person who used the information or to whom the disclosure was made. Thus, where a minimum necessary violation occurs in a disclosure to a business associate or as an internal use within a covered entity or business associate, the fact that the information was not acquired by a third party would be considered as part of the risk assessment and may help lead to the conclusion that there is a low probability that the protected health information has been compromised. Alternatively, covered entities and business associates may determine that certain minimum necessary violations fall within the exceptions to the definition of breach at § 164.402(1)(i) or (1)(ii). We note that the Privacy Rule’s minimum necessary standard requires a covered entity to make reasonable efforts to limit access to protected health information to those persons or classes of persons who need access to protected health information to carry out their duties and to disclose an amount of protected health information reasonably necessary to achieve the purpose of a disclosure. The Privacy Rule requires covered entities to determine and define in their policies and procedures how the minimum necessary standard applies to their own uses and disclosures. Thus, covered entities are in a good position to know when such policies and procedures have been violated and to assess the probability that the incident has compromised the security or privacy of the information. Finally, we will consider including further guidance regarding the interaction between the minimum necessary standard and the breach notification requirements in the guidance required by section 13405(b)(1)(B) of the HITECH Act. Comment: Several commenters asked that we clarify the differences between ‘‘acquisition,’’ ‘‘access,’’ ‘‘use,’’ and ‘‘disclosure’’ in the exceptions in the final rule. These commenters expressed confusion regarding the use of these terms in the first two exceptions to the definition of breach, stating that the term ‘‘acquisition’’ connotes a disclosure of information, and thus, the exception regarding unintentional acquisition, access, or use of protected health information by a workforce member or person acting under the authority of a covered entity or business associate implicitly includes disclosures of protected health information. Response: While the Privacy Rule uses the terms ‘‘use’’ and ‘‘disclosure,’’ we included both ‘‘acquisition’’ and ‘‘access’’ in the regulatory text for consistency with the statutory language. We interpret ‘‘acquisition’’ and ‘‘access’’ VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 to information based on their plain meanings and believe that both terms are encompassed within the current definitions of ‘‘use’’ and ‘‘disclosure’’ in the HIPAA Rules. For example, an acquisition may be a ‘‘use’’ or ‘‘disclosure’’ depending on who acquired the information—i.e., a workforce member or someone outside the covered entity, such as a business associate. Comment: Several commenters supported our interpretations of the statutory terms ‘‘employee,’’ ‘‘same facility,’’ and ‘‘similarly situated individual’’ with respect to the exceptions to the definition of breach. Response: We retain these clarifications in this final rule. Comment: Some commenters asked that we use the term ‘‘use’’ instead of ‘‘disclosure’’ to describe the type of information exchange contemplated by the exception for certain inadvertent disclosures among persons similarly authorized to access protected health information at a covered entity or business associate since the information must be shared within a covered entity or business associate for the exception to apply. Response: We clarify that the exception at paragraph (1)(ii) of the definition of ‘‘breach’’ is intended to apply to certain ‘‘disclosures’’ that may occur ‘‘at’’ a covered entity, business associate, or organized health care arrangement in which the covered entity participates—e.g., to persons onsite at a covered entity’s facility that are not workforce members, such as physicians with staff privileges at a hospital. For impermissible ‘‘uses’’ of protected health information among workforce members of a covered entity or a business associate, a covered entity or business associate should determine whether the exception to breach at paragraph (1)(i) regarding certain unintentional acquisition, access, or use by a workforce member or person acting under the authority of a covered entity or business associate applies. Comment: One commenter asked if breach notification is required in cases where an impermissible use or disclosure originally qualifies for either of the exceptions to breach at § 164.402(1)(i) or (1)(ii) at the time the incident occurs but later no longer fits within the exception because the protected health information is further used or disclosed in an impermissible manner. Response: The applicability of an exception to breach must be judged at the time the incident is discovered and evaluated. If an exception to breach is determined to apply such that PO 00000 Frm 00081 Fmt 4701 Sfmt 4700 5645 notification is not warranted, the inquiry into that breach ends; however, the covered entity or business associate should take appropriate steps to ensure that the information is not further used or disclosed impermissibly. If, sometime after making the determination that the exception applied, the information is impermissibly used or disclosed, the covered entity or business associate should treat that incident as a separate impermissible use or disclosure that warrants evaluation as a breach on its own. As explained more fully below, we treat a breach as having occurred at the time of the impermissible use or disclosure, which in the case of the first two exceptions to breach, is at the time of the ‘‘further’’ impermissible use or disclosure. Comment: One commenter asked that we broaden the application of the inadvertent disclosure exception to apply to all routine disclosures between covered entities. Other commenters asked that the rule exempt from the breach notification obligations situations in which a covered entity discloses information to a business associate or another covered entity. Commenters noted that because covered entities and business associates are required to protect the privacy of protected health information, there is little risk that even an impermissible disclosure between such entities would compromise the security or privacy of the information. Response: We do not agree that such situations warrant a blanket exception from the breach notification rules. In appropriate cases, some of these impermissible disclosures among covered entities and covered entities and business associates may fall within the existing exceptions to breach at paragraphs (1)(i) and (ii) of the definition. Otherwise, such disclosures must be evaluated as to the probability that the protected health information has been compromised based on a risk assessment of a number of factors. While the fact that the recipient of an impermissible disclosure is a covered entity or business associate with obligations to protect the privacy and security of protected health information is a consideration with respect to assessing the risk that the protected health information has been compromised, it is not the only factor. For example, a covered entity or business associate must also evaluate the extent to which the risk to the protected health information has been mitigated. Comment: Several commenters suggested that the exceptions to breach should not apply to situations where E:\FR\FM\25JAR2.SGM 25JAR2 sroberts on DSK5SPTVN1PROD with 5646 Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations workforce members or employees further use or disclose information they unintentionally or inadvertently acquired, accessed, or used, even if such further use or disclosure is permitted under the Privacy Rule. Additionally, these commenters suggested that the breach exceptions should apply only in cases in which the workforce member or employee has taken appropriate steps to mitigate the unintentional acquisition, access, or use of protected health information, such as by alerting the sender of the misdirected information, if applicable, and returning or destroying it. Response: We do not believe it is appropriate to prohibit the sharing of protected health information for permissible purposes following an unintentional or inadvertent error by a workforce member or an employee. Doing so would restrict access and disclosure of the protected health information for necessary treatment and other important purposes to the extent the workforce member or employee needed access to the information in the future for authorized purposes, which would adversely affect health care delivery. We believe that the rule strikes an appropriate balance by not allowing workforce member errors to be excepted from the definition of breach in cases where the workforce member takes the information he or she has mistakenly obtained and then misuses it. With respect to requiring workforce members or employees to take appropriate steps to mitigate their unintentional access to protected health information, we note that the Privacy Rule already requires covered entities to ensure as part of their minimum necessary policies and procedures that workforce members have appropriate access to protected health information. Therefore, covered entities should ensure that workforce members who gain access in an unauthorized manner to protected health information do not continue to have such unauthorized access. This may require having policies which require workforce members to return or destroy the information to which they obtained unauthorized access. Further, covered entities must implement reasonable safeguards to protect against impermissible uses and disclosures, including further impermissible uses and disclosures by a workforce member who has gained unauthorized access to protected health information. Comment: One commenter asked that we include an exception in the final rule for situations in which a laptop is lost and recovered and a forensic analysis shows that the protected health VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 information on the computer was not accessed. The commenter stated that because the forensic analysis showed that the information was not compromised, a risk assessment should not be required. Response: We do not include an explicit exception for this particular scenario. As we explained above, in cases where a lost laptop is recovered, the fact that a forensic analysis of the computer shows that its information was not accessed is a relevant consideration for the risk assessment, and entities in such situations may be able to demonstrate a low probability that the information has been compromised. However, covered entities and business associates still must document their risk assessments in these cases. We also note, as we did in the interim final rule, if a computer is lost or stolen, we do not consider it reasonable to delay breach notification based on the hope that the computer will be recovered. Comment: Some commenters asked that we create an exception to breach to cover certain routine impermissible disclosures of protected health information. For example, commenters asked that we except from notification disclosures made as a result of the covered entity mailing information to a patient’s old address, faxing information to the wrong number, disclosures made as a result of leaving a voice message at the wrong number reminding a patient of an upcoming appointment, or, in situations where patients have identical or similar names, contacting the wrong patient to inform him or her that lab results were ready. Response: We decline to create such an exception. The ability of a covered entity or business associate to demonstrate that a particular situation poses a low probability that the protected health information was compromised is very fact specific and will depend on an assessment of all of the factors discussed above, such as to whom the information was disclosed, what information was disclosed, and what mitigation has taken place. We also note that, in some cases, some of the situations contemplated by the commenters may fall within an existing exception. For example, if a covered entity mails protected health information about an individual to a wrong address, the impermissible disclosure may fall into the exception at paragraph (1)(iii) of the definition of breach if the information is returned, undelivered and unopened, to the covered entity, such that an unauthorized recipient could not reasonably have retained the PO 00000 Frm 00082 Fmt 4701 Sfmt 4700 information. If, however, the information was not returned or if the covered entity was informed by the unauthorized recipient that he had received and opened the mail in error, the covered entity would need to complete a risk assessment to determine the probability that the protected health information had been compromised as a result of the impermissible disclosure. Comment: Several commenters asked that we harmonize the final rule with the FTC’s Health Breach Notification final rule. Response: Although the FTC and HHS breach notification rules generally apply to different entities, HHS has worked closely with the FTC to ensure both sets of regulations were harmonized to the greatest extent possible by including the same or similar requirements within the constraints of the statutory language. In addition, in the few situations where an entity provides PHRs to customers of a HIPAA covered entity through a business associate arrangement but also provides PHRs directly to the public and a breach of its records occurs, in certain cases, the FTC will deem compliance with certain provisions of HHS’ rule as compliance with FTC’s rule. See 74 FR 42964. In particular, in such situations, it may be appropriate for the vendor to provide the same breach notice to all its PHR customers since it has a direct relationship with all the affected individuals. Thus, in those limited circumstances where a vendor of PHRs (1) provides notice to individuals on behalf of a HIPAA covered entity, (2) has dealt directly with these individuals in managing their PHR accounts, and (3) provides notice to its customers at the same time, the FTC will deem compliance with HHS requirements governing the timing, method, and content of notice to be compliance with the corresponding FTC rule provisions. Note, however, that the PHR vendor still must comply with all other FTC rule requirements, including the requirement to notify the FTC within ten business days after discovering the breach. b. Definition of ‘‘Unsecured Protected Health Information’’ Interim Final Rule Section 13402(h)(1)(A) of the Act defines ‘‘unsecured protected health information’’ as ‘‘protected health information’’ that is not secured through the use of a technology or methodology specified by the Secretary in guidance issued under [section 13402(h)(2)].’’ The Act at section 13402(h)(2) requires that the Secretary specify in the guidance the technologies and methodologies that E:\FR\FM\25JAR2.SGM 25JAR2 Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations render protected health information unusable, unreadable, or indecipherable to unauthorized individuals. Accordingly, the interim final rule defined ‘‘unsecured protected health information’’ as protected health information that is not rendered unusable, unreadable, or indecipherable to unauthorized individuals through the use of a technology or methodology specified by the Secretary in guidance. This guidance, which was published in updated form within the preamble to the interim final rule and made available on the HHS Web site, specifies that only encryption and destruction, consistent with National Institute of Standards and Technology (NIST) guidelines, renders protected health information unusable, unreadable, or indecipherable to unauthorized individuals such that notification is not required in the event of a breach of such information. Overview of Public Comments While we received a number of technical and other comments on the guidance, we did not receive any comments on the language of the above definition itself. We intend to address the comments on the guidance in our next update to the guidance. Final Rule The final rule modifies the interim final rule’s definition of ‘‘unsecured protected health information’’ to replace the term ‘‘unauthorized individuals’’ in the definition with ‘‘unauthorized persons.’’ The term ‘‘individual’’ is defined in § 160.103 to mean the person who is the subject of the protected health information, which is not what is intended with the reference to ‘‘individual’’ in the definition of ‘‘unsecured protected health information.’’ Accordingly, the final rule uses more appropriately the term ‘‘unauthorized persons.’’ The final rule also modifies the definition to remove the term ‘‘on the HHS Web site’’ as unnecessary language. While we remove the reference to the HHS Web site from the regulatory text, we do plan to continue to post updates to the guidance on the Web site as they are issued. sroberts on DSK5SPTVN1PROD with 2. Section 164.404—Notification to Individuals Interim Final Rule Section 13402(a) of the Act provides that a covered entity that accesses, maintains, retains, modifies, records, stores, destroys, or otherwise holds, uses, or discloses unsecured protected health information shall, in the case of a breach of such information that is discovered by the covered entity, notify VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 each affected individual whose unsecured protected health information has been, or is reasonably believed by the covered entity to have been, accessed, acquired, or disclosed as a result of such breach. Accordingly, § 164.404(a)(1) of the interim final rule included the general rule that a covered entity shall, following the discovery of a breach of unsecured protected health information, notify each individual whose unsecured protected health information has been, or is reasonably believed to have been accessed, acquired, used, or disclosed as a result of such breach. Breaches Treated as Discovered Section 13402(c) of the HITECH Act states that a breach shall be treated as discovered by a covered entity or business associate as of the first day on which such breach is known or should reasonably have been known to the covered entity or business associate. The Act also specifies that this discovery is triggered as soon as any person, other than the individual committing the breach, who is an employee, officer, or other agent of the covered entity or business associate knows or should reasonably have known of the breach. Section 164.404(a)(2) of the interim final rule implemented the Act’s discovery provision, with respect to covered entities by stating that a breach shall be treated as discovered by a covered entity on the first day the breach is known to the covered entity, or by exercising reasonable diligence would have been known to the covered entity. The interim final rule incorporated the term ‘‘by exercising reasonable diligence,’’ which is used in the HIPAA Enforcement Rule and defined to mean the ‘‘business care and prudence expected from a person seeking to satisfy a legal requirement under similar circumstances.’’ Section 164.404(a)(2) of the interim final rule further provided, in accordance with the Act, that a covered entity is deemed to have knowledge of a breach if such breach is known, or by exercising reasonable diligence would have been known, to any person other than the person committing the breach, who is a workforce member or agent of the covered entity. Thus, the breach is treated as discovered by the covered entity at the time the workforce member or other agent has knowledge of the breach. The rule also clarified that the federal common law of agency controls in determining who is an agent of the covered entity, which is consistent with how agency liability is determined under the HIPAA Rules. PO 00000 Frm 00083 Fmt 4701 Sfmt 4700 5647 Overview of Public Comments Several commenters argued that a breach should be treated as discovered by a covered entity only after management has been notified of the incident. Commenters stated that the Department should not hold an entity responsible for knowing of a breach if an appropriately trained employee fails to inform the proper persons within the entity of a breach. Other commenters asked for guidance and more clarification regarding what it means for a covered entity or business associate to be exercising reasonable diligence, such as what frequency of monitoring for breaches is expected or what types of systems must covered entities and business associates have in place to detect breaches. Final Rule We retain § 164.404(a)(2) in this final rule without modification. We decline to adopt the suggestion that a covered entity be deemed to have discovered a breach only when management is notified of the breach. The HITECH Act itself provides that a breach is to be treated as discovered by a covered entity or business associate if ‘‘any person, other than the individual committing the breach, that is an employee, officer, or other agent of such entity or associate’’ knows or should reasonably have known of the breach. This concept is also consistent with the HIPAA Enforcement Rule and the Federal common law of agency. We encourage covered entities and business associates to ensure their workforce members and other agents are adequately trained on the importance of prompt reporting of privacy and security incidents. With respect to those commenters asking for guidance on what it means for a covered entity to be exercising reasonable diligence, we note that the term reasonable diligence, as defined in § 160.401, means the business care and prudence expected from a person seeking to satisfy a legal requirement under similar circumstances. The determination of whether a person acted with reasonable diligence is generally a factual one, since what is reasonable depends on the circumstances. Factors to be considered include whether a covered entity or business associate took reasonable steps to learn of breaches and whether there were indications of breaches that a person seeking to satisfy the Rule would have investigated under similar circumstances. Covered entities and business associates may wish to look to how other covered entities and business associates operating under E:\FR\FM\25JAR2.SGM 25JAR2 5648 Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations similar circumstances conduct themselves for a standard of practice. Timeliness Section 13402(d) of the Act and the implementing regulations at § 164.404(b) require covered entities to notify individuals of a breach without unreasonable delay but in no case later than 60 calendar days from the discovery of the breach, except in certain circumstances where law enforcement has requested a delay. Under this rule, the time period for breach notification begins when the incident is first known, not when the investigation of the incident is complete, even if it is initially unclear whether the incident constitutes a breach as defined in the rule. A covered entity is expected to make the individual notifications as soon as reasonably possible after the covered entity takes a reasonable time to investigate the circumstances surrounding the breach in order to collect and develop the information required to be included in the notice to the individual. The 60 days is an outer limit and therefore, in some cases, it may be an ‘‘unreasonable delay’’ to wait until the 60th day to provide notification. sroberts on DSK5SPTVN1PROD with Overview of Public Comments While some commenters generally were supportive of this provision in the interim final rule, others argued that the 60-day timeframe for notification to individuals is unreasonable and requested more time, such as 120 days, to provide the notifications. Some commenters argued that the clock on the 60-day timeframe should not begin to run until after a covered entity has completed its investigation and determined that a breach has occurred. Another commenter expressed the need for clarification about the types of delays in notifying individuals that would be considered reasonable and whether a covered entity’s resources would be taken into account in determining whether any delay was reasonable. Final Rule We retain § 164.404(b) in this final rule without modification. This is the standard expressly provided for in the statute and we otherwise do not believe it necessary or prudent to extend the timeframe. Covered entities and business associates have been operating under this timeliness standard since the issuance of the interim final rule and we believe a longer time period to notify individuals of breaches of unsecured protected health information could VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 adversely impact affected individuals and the ability to mitigate adverse consequences. For the same reasons, we continue to provide that the time period begins to run when the incident becomes known, not when it is determined that a breach as defined by the rule has occurred. There is sufficient time within this standard both to conduct a prompt investigation of the incident and to notify affected individuals. With respect to what constitutes a reasonable versus unreasonable delay within the 60-day timeframe, such determinations are fact specific and there are many factors that may be relevant, including the nature of the breach, number of individuals affected, and resources of the covered entity. Content of the Notification Section 13402(f) of the HITECH Act set forth the content requirements for the breach notice to the individual. Section 164.404(c) of the interim final rule incorporated the statutory elements, requiring the following information be included in the notices, to the extent possible: (1) A brief description of what happened, including the date of the breach and the date of the discovery of the breach, if known; (2) a description of the types of unsecured protected health information that were involved in the breach (such as whether full name, social security number, date of birth, home address, account number, diagnosis, disability code, or other types of information were involved); (3) any steps individuals should take to protect themselves from potential harm resulting from the breach; (4) a brief description of what the covered entity involved is doing to investigate the breach, mitigate the harm to individuals, and to protect against any further breaches; and (5) contact procedures for individuals to ask questions or learn additional information, which shall include a tollfree telephone number, an email address, Web site, or postal address. The interim final rule added the term ‘‘diagnosis,’’ to the parenthetical listing of examples of types of protected health information, which was not in the statute, to make clear that, where appropriate, a covered entity may need to indicate in the notification to the individual whether and what types of treatment information were involved in a breach. In addition, with respect to a covered entity’s mitigation, the interim final rule replaced the statutory term ‘‘mitigate losses’’ with ‘‘mitigate harm to individuals’’ to make clear that the notification should describe the steps the covered entity is taking to mitigate PO 00000 Frm 00084 Fmt 4701 Sfmt 4700 potential harm to individuals resulting from the breach and that such harm is not limited to economic loss. To address the readability and accessibility of the notice, the interim final rule made a number of clarifications. First, the Department included in the interim final rule a requirement that the breach notices be written in plain language so that individuals will be able to understand them more easily, which means the notice should be written at an appropriate reading level, using clear language and syntax, and not include any extraneous material that might diminish the message it is trying to convey. Second, the interim final rule explained that some covered entities may have obligations under other laws with respect to their communication with affected individuals. For example, to the extent a covered entity is obligated to comply with Title VI of the Civil Rights Act of 1964, the covered entity must take reasonable steps to ensure meaningful access for Limited English Proficient persons to the services of the covered entity, which could include translating the notice into frequently encountered languages. Similarly, to the extent that a covered entity is required to comply with Section 504 of the Rehabilitation Act of 1973 or the Americans with Disabilities Act of 1990, the covered entity has an obligation to take steps that may be necessary to ensure effective communication with individuals with disabilities, which could include making the notice available in alternate formats, such as Braille, large print, or audio. Overview of Public Comments Several commenters stated that the content requirements for breach notification were too vague. Some commenters asked that we provide templates or sample notices to be used by covered entities. Other commenters asked for more specific guidance about particular required content elements of the notice, such as what information should be provided to individuals about a covered entity’s or business associate’s mitigation efforts and regarding any employee sanctions, particularly if a company has policies that require certain employment actions be kept confidential. It was also suggested that we publish a list of actions to be included in the notices based on the type of breach with respect to the steps individuals should take to protect themselves from harm. Some commenters also asked that the Department clarify that the requirement E:\FR\FM\25JAR2.SGM 25JAR2 Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations sroberts on DSK5SPTVN1PROD with to include ‘‘a brief description of what happened’’ would not require the covered entity or business associate to describe how the breach occurred such that it would create a roadmap for future breaches. Final Rule We retain § 164.404(c) in this final rule without modification. The content requirements in the Rule generally mirror the content requirements in the statute and each element is an important component of the notice to ensure individuals receive the information they need to protect themselves to the extent possible from the consequences of a breach and to learn what is being done to mitigate the breach and prevent future breaches. At the same time, the content provisions are sufficiently flexible to allow covered entities and business associates to tailor the breach notices based on the circumstances surrounding the breach and of the entity. In our experience in administering the Rule since 2009, the Rule provides sufficient flexibility to describe to the individual the circumstances surrounding the breach in a more general manner that still provides the individual with pertinent information but that does not provide a roadmap to third parties for future breaches. For example, the notice need not explain the exact type of vulnerability in the security of a covered entity’s electronic records system that led to unauthorized access and how that vulnerability was exploited. Similarly, a covered entity has flexibility in describing what the covered entity is doing in response to a breach. Where employee sanctions are relevant based on the circumstances of the breach, a covered entity may determine that it wants to describe the sanctions imposed more generally and nothing in the Rule would require that the notice include the names of the employees involved. For example, a covered entity may want to indicate generally that the employees involved have been appropriately disciplined, particularly if multiple employees received varying levels of sanctions based on their degrees of involvement in the breach. In other cases, it may benefit the covered entity to be more specific so as to better assure individuals that the entity is appropriately addressing the situation, such as indicating that an employee who improperly accessed and sold patient information was promptly terminated. With respect to templates, examples, or other guidance, the Department anticipates providing additional guidance in the future. VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 Methods of Notification Section 13402(e)(1) of the HITECH Act provides for both actual written notice to affected individuals, as well as substitute notice to affected individuals if contact information is insufficient or out-of-date. Specifically, the statute requires breach notifications to be sent by first-class mail at the last known address of the individual or next of kin if the individual is deceased, or by electronic mail if specified as the preferred method by the individual. The Act also provides that the notification may be provided in one or more mailings as the information becomes available. Where there is insufficient or out-of-date contact information that precludes direct written notice to the individual, the statute requires that a substitute form of notice be provided to the individual. If there is insufficient contact information for 10 or more individuals, the Act requires that the substitute notice be a conspicuous posting on the home page of the covered entity’s Web site or notice in major print or broadcast media in the geographic areas where the affected individuals likely reside, and in either case, that a toll-free number be included where individuals can learn whether their information was possibly included in the breach. Finally, the Act provides that a covered entity may provide notice by telephone or other means to individuals, in addition to direct written notice by first-class mail or email, in urgent situations involving possible imminent misuse of the individual’s information. Section 164.404(d) of the interim final rule set forth these methods for providing breach notification to affected individuals. Section 164.404(d)(1)(i) of the interim final rule required a covered entity to provide breach notice to an affected individual in written form by first-class mail at the individual’s last known address. The interim final rule also permitted covered entities to provide this written notice in the form of electronic mail if the individual has agreed to receive electronic notice and that agreement has not been withdrawn. The Department clarified that, consistent with § 164.502(g) of the Privacy Rule, where the individual affected by a breach is a minor or otherwise lacks legal capacity due to a physical or mental condition, notice to the parent or other person who is the personal representative of the individual would satisfy the requirements of § 164.404(d)(1). Additionally, with respect to deceased individuals, the interim final rule at § 164.404(d)(1)(ii) provided that notice PO 00000 Frm 00085 Fmt 4701 Sfmt 4700 5649 of a breach be sent to either the individual’s next of kin or personal representative, as such term is used for purposes of the Privacy Rule, recognizing that in some cases, a covered entity may have contact information for a personal representative of a deceased individual rather than the next of kin. To address administrative and privacy concerns with a covered entity being required to obtain contact information for the next of kin of a deceased patient in cases where the individual did not otherwise provide the information while alive, the interim final rule also clarified that a covered entity is only required to provide notice to the next of kin or personal representative if the covered entity both knows the individual is deceased and has the address of the next of kin or personal representative of the decedent. If a covered entity does not have sufficient contact information for some or all of the affected individuals, or if some notices are returned as undeliverable, the interim final rule required a covered entity to provide substitute notice for the unreachable individuals in accordance with § 164.404(d)(2). The interim final rule required that substitute notice be provided as soon as reasonably possible after the covered entity is aware that it has insufficient or out-of-date contact information for one or more affected individuals and that the notice contain all the elements that § 164.404(c) requires be included in the direct written notice to individuals. With respect to decedents, however, the interim final rule provided that a covered entity is not required to provide substitute notice for the next of kin or personal representative in cases where the covered entity either does not have contact information or has out-of-date contact information for the next of kin or personal representative. Section 164.404(d)(2) of the interim final rule required that, whatever method used, the substitute form of notice be reasonably calculated to reach the individuals for whom it is being provided. If there are fewer than 10 individuals for whom the covered entity has insufficient or out-of-date contact information to provide the written notice, § 164.404(d)(2)(i) of the interim final rule permitted the covered entity to provide substitute notice to such individuals through an alternative form of written notice, by telephone, or other means. For example, if a covered entity learned that the home address it has for one of its patients was out-of-date, but it had the patient’s email address or telephone number, it could provide E:\FR\FM\25JAR2.SGM 25JAR2 sroberts on DSK5SPTVN1PROD with 5650 Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations substitute notice by email (even if the patient had not agreed to electronic notice) or by phone. Alternatively, posting a notice on the Web site of the covered entity or at another location may be appropriate if the covered entity lacks any current contact information for the patients, so long as the posting is done in a manner that is reasonably calculated to reach the individuals. If a covered entity has insufficient or out-of-date contact information for 10 or more individuals, then § 164.404(d)(2)(ii) of the interim final rule required the covered entity to provide substitute notice through either a conspicuous posting for a period of 90 days on the home page of its Web site or conspicuous notice in major print or broadcast media in geographic areas where the individuals affected by the breach likely reside. For either method involving 10 or more individuals, the covered entity was also required to have a toll-free phone number, active for 90 days, where an individual can learn whether the individual’s unsecured protected health information may be included in the breach and to include the number in the notice. If a covered entity chooses to provide substitute notice on its Web site, the covered entity may provide all the information described at § 164.404(c) directly on its home page (‘‘home page’’ includes the home page for visitors to the covered entity’s Web site and the landing page or login page for existing account holders) or may provide a prominent hyperlink on its home page to the notice containing such information. If the covered entity does not have or does not wish to use a Web site for the substitute notice, the interim final rule required the covered entity to provide substitute notice of the breach in major print or broadcast media in geographic areas where the individuals affected by the breach likely reside. What is considered major print or broadcast media for a metropolitan area may be very different from what is considered major print or broadcast media in a rural area, such that the use of local, city, or state-wide media may be appropriate depending on the circumstances. Further, multiple media outlets may need to be utilized to reasonably reach individuals in different regions or States. In any event, substitute media notice, as with substitute Web notice, must be conspicuous and thus, covered entities should consider the location and duration of the notice to ensure the notice is reasonably calculated to reach the affected individuals. Finally, we clarified that covered entities with out-of-date or insufficient VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 contact information for some individuals can attempt to update the contact information so that they can provide direct written notification, in order to limit the number of individuals for whom substitute notice is required and, thus, potentially avoid the obligation to provide substitute notice through a Web site or major print or broadcast media under § 164.404(d)(2)(ii). In accordance with the statute, § 164.404(d)(3) makes clear that notice to the individual by telephone or other means may be provided, in addition to the direct written notice required by § 164.404(d)(1), in cases deemed by the covered entity to require urgency because of possible imminent misuse of unsecured protected health information. Overview of Public Comments Several commenters questioned which entity has the responsibility for providing notifications to individuals when a breach occurs at or by a business associate and whether a covered entity could delegate its breach notification obligations to a business associate. Some commenters asked about the notification obligations in cases where a covered entity’s business associate that experiences a breach is also a covered entity itself. Others requested clarification regarding the obligations for providing breach notification where multiple covered entities and business associates are involved in health information exchange and it may be unclear where a breach occurred and/or which entity has responsibility for the breach. Additionally, many commenters suggested that covered entities be permitted to provide notification to individuals via telephone or orally instead of via written communication, or at a work address instead of a home address, if the individual has specified one of these alternative methods or locations as preferred for receiving breach notification. Commenters raised potential privacy concerns with communicating with individuals via mail to their home, particularly where the individual has received highly confidential medical services, such as substance abuse or mental health services, and others who may have access to the mail may not otherwise be aware of such condition or treatment. Some commenters argued that because the Privacy Rule requires covered entities to accommodate reasonable requests by individuals to receive communications by alternative means or at alternative locations, the same standard should apply to the provision of breach notification. PO 00000 Frm 00086 Fmt 4701 Sfmt 4700 Finally, several commenters expressed concern over the substitute notice required in cases in which the covered entity has insufficient or out-ofdate contact information for affected individuals. Many of these commenters stated that providing notification via Web posting or media publication is an inappropriate method of providing substitute notice, except in cases in which the covered entity can reasonably define the universe of affected individuals. In other cases, such notice will not give individuals who view the notice enough information to determine if they are affected by a breach, and may cause unaffected individuals unnecessary alarm. Some commenters recommended that covered entities instead be required to use reasonable efforts to identify alternative means of providing direct notice to the affected individuals, such as by phone or email, or to only require substitute media or Web notice when a covered entity cannot reach 10 or more individuals directly by mail, phone, or email. Other commenters argued that the substitute notice requirements, particularly the requirement to establish a toll-free number, may be cost prohibitive to smaller covered entities. It was also suggested that smaller covered entities, particularly those in rural areas, should be allowed to provide substitute notice via handouts or postings at the covered entity’s physical location even in cases where the entity has insufficient contact information for more than 10 individuals. Final Rule We retain § 164.404(d) in this final rule without modification. In response to questions raised with respect to a breach at or by a business associate, we note that the covered entity ultimately maintains the obligation to notify affected individuals of the breach under § 164.404, although a covered entity is free to delegate the responsibility to the business associate that suffered the breach or to another of its business associates. This is the case even if the breach of the covered entity’s protected health information occurred at or by a business associate that is also a covered entity. For example, if a covered provider (Provider A) hires another covered provider’s practice (Provider B) as a business associate to perform his billing and other back office functions, and a breach of Provider A’s protected health information occurs at Provider B while performing these functions for Provider A, it remains Provider A’s responsibility to provide breach notification to the affected individuals, although Provider A may delegate this E:\FR\FM\25JAR2.SGM 25JAR2 sroberts on DSK5SPTVN1PROD with Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations responsibility to Provider B as its business associate. Covered entities and business associates should consider which entity is in the best position to provide notice to the individual, which may depend on various circumstances, such as the functions the business associate performs on behalf of the covered entity and which entity has the relationship with the individual. Similarly, when multiple covered entities participate in electronic health information exchange and there is a breach of unsecured protected health information at a Health Information Organization (HIO), the obligation to notify individuals of the breach falls to the covered entities. We recognize that it may be difficult to determine what breached information is attributable to which covered entity’s individuals. For example, an HIO may store centralized electronic health records (EHRs) for a community, with each EHR including information generated by multiple covered entities. In such circumstances, it may be necessary for the HIO to notify all potentially affected covered entities and for those covered entities to delegate to the HIO the responsibility of sending the required notifications to the affected individuals. This would avoid the confusion of individuals receiving more than one notification about the same breach. In response to the commenters who suggested that covered entities be permitted to accommodate reasonable requests by individuals to receive breach notifications by alternative means or at alternative locations, we provide the following guidance. The HITECH Act requires a covered entity to provide breach notification to an affected individual in written form either at the last known address of the individual or email address, if the individual agrees to receive notice electronically, where the covered entity has sufficient contact information to do so. The Act and this rule do not prohibit a covered entity from sending a breach notice to an alternative address rather than a home address, such as a work address or post office box, or the individual’s email address of choice, if the individual requests communications be sent to such an address. Further, a covered health care provider (and health plan, if potential endangerment is raised by the individual) is required by the Privacy Rule at § 164.522 to accommodate any such reasonable requests. In response to those commenters who urged that we allow breach notices to be provided orally or via telephone to individuals receiving highly VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 confidential treatment services where the individual has requested to receive communications in such a manner, we note that the HITECH Act specifically refers to ‘‘written’’ notice to be provided to individuals. However, we understand the privacy concerns raised. We, thus, clarify that in the limited circumstances in which an individual has agreed only to receive communications from a covered health care provider orally or by telephone, the provider is permitted under the Rule to telephone the individual to request and have the individual pick up their written breach notice from the provider directly. In cases in which the individual does not agree or wish to travel to the provider to pick up the written breach notice, the health care provider should provide all of the information in the breach notice over the phone to the individual, document that it has done so, and the Department will exercise enforcement discretion in such cases with respect to the ‘‘written notice’’ requirement. We stress that our enforcement discretion applies only to cases where the individual affirmatively chooses not to receive communications from a covered health care provider at any written addresses or email addresses, and not to situations where providing telephonic notice is simply less burdensome or easier on a provider and the entity has a valid address, or email address if applicable, on file for the affected individual. Finally, with respect to commenters who expressed concerns with the substitute media and Web notice provisions of the interim final rule, we emphasize that these are statutory requirements that have been incorporated into the Rule. Section 13402(e)(1)(B) of the HITECH Act expressly requires that a covered entity that has insufficient or out-of-date contact information for 10 or more individuals provide substitute notification to such individuals via posting on their Web site or notification in major print or broadcast media in the areas in which the affected individuals likely reside. Additionally, the statute requires such ‘‘notice in media or web posting will include a toll-free phone number where an individual can learn whether or not the individual’s unsecured protected health information is possibly included in the breach.’’ Thus, we retain these requirements in this final rule. Response to Other Public Comments Comment: One commenter expressed concern about providing breach notification to individuals by first-class mail because it could require some PO 00000 Frm 00087 Fmt 4701 Sfmt 4700 5651 entities, such as those that have Webbased relationships with individuals, to collect more information about individuals (e.g., physical addresses) than they currently do. Response: The Rule allows a covered entity to provide written breach notice to an affected individual by email if the individual agrees to electronic notice and such agreement has not been withdrawn. We would expect that covered entities that have primarily or solely an online relationship with individuals would ask and encourage individuals to receive breach notices by email and that generally individuals would agree. However, an individual that does not affirmatively agree to receive breach notices by email, or that withdraws a prior agreement, has a right to notice by first-class mail. Comment: One commenter suggested that we excuse a covered entity from providing notification of a breach to an individual where a licensed health care professional has determined in the exercise of professional judgment that the provision of such notice is likely to cause substantial harm to the individual. The commenter appeared to be concerned due to the nature of the services it provides—mental health services—and the distress breach notification could cause for certain of its patients. Response: The statute does not include such an exception to the provision of breach notification, and we do not include one in this Rule. An affected individual has a right to be informed of breaches of unsecured protected health information so the individual can take steps if appropriate to protect themselves from the consequences. In situations where a health care provider believes that the provision of written breach notification to an individual may cause extreme anguish or distress, based on the individual’s mental state or other circumstances, the provider may telephone the individual prior to the time the breach notice is mailed or have them come into the provider’s office to discuss the situation. However, we note that the breach notification must still be mailed without unreasonable delay and in no case later than 60 calendar days after discovery of the breach. Where a provider is aware that an individual has a personal representative due to incapacity or other health condition, the breach notification may be sent to the personal representative. Comment: Many commenters expressed support for allowing covered entities to provide breach notification to a deceased individual’s personal representative instead of to the next of E:\FR\FM\25JAR2.SGM 25JAR2 sroberts on DSK5SPTVN1PROD with 5652 Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations kin. One commenter suggested that we also allow covered entities to provide breach notification to the emergency contact provided by a deceased individual prior to death as this is the information they collect from individuals and yet this person may not be the next of kin or a personal representative of the deceased individual. Response: We do not believe it appropriate to permit covered entities to send breach notifications to a deceased individual’s emergency contact where such person is not a personal representative (such as an executor or administrator of the decedent’s estate) or next of kin of the decedent, as such notices may convey information about the decedent’s care the decedent never wished the emergency contact to have and/or may go to a person who has no authority to act on the notice. Comment: To reduce the costs associated with sending breach notifications, one commenter asked that we adopt the Department of Labor’s standard for providing COBRA Election Notices to allow a covered entity to: (1) Where a breach affects both a plan participant and the participant’s spouse, send one breach notice addressed to both if both spouses reside at the same address; and (2) where a breach affects a dependent child (of any age) under a plan, send a breach notice to either the plan participant and/or the participant’s spouse, provided the dependent child resides at the same address. The commenter stated the notice should clearly identify the individuals or classes of individuals to whom the notice applies. Response: A covered entity is permitted to send one breach notice addressed to both a plan participant and the participant’s spouse or other dependents under the plan who are affected by a breach, so long as they all reside at a single address and the covered entity clearly identifies on the notice the individuals to which the notice applies. Further, a covered entity may send a notice regarding the breach of a dependent child’s protected health information addressed to the plan participant and/or participant’s spouse living with the dependent child, so long as the participant and/or participant’s spouse are the personal representatives of the dependent child and the notice clearly identifies to whom it applies. Such notices by first-class mail would meet the written notice requirements of § 164.404(d)(1)(i). However, one breach notice covering both the plan participant and the dependents under the plan mailed to the plan participant’s address would not suffice if the address VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 of one or more dependents affected by the breach was different than the participant’s address. Further, where a plan participant (and/or spouse) is not the personal representative of a dependent under the plan, a covered entity must address a breach notice to the dependent himself or herself. Comment: Several commenters expressed support for the acknowledgment in the preamble to the interim final rule that some covered entities may have obligations under Civil Rights laws to ensure that breach notifications are provided to individuals in alternative languages, and in alternative formats, such as Braille, large print, or audio, where appropriate. Some commenters requested additional guidance regarding how to ensure compliance with these laws with respect to breach notifications. Response: Additional guidance on how to comply with Title VI of the Civil Rights Act of 1964, Section 504 of the Rehabilitation Act of 1973, and the Americans with Disabilities Act of 1990, is available on the OCR Web site at https://www.hhs.gov/ocr/civilrights/. Further, covered entities with questions on how to comply may contact one of OCR’s ten regional offices. Contact information is available at https:// www.hhs.gov/ocr/office/about/rgnhqaddresses.html. Comment: Some commenters suggested that the final rule adopt a substitute notification provision similar to that in many State laws that allows for substitute notification, rather than direct written notice, to the individual in the event of breaches affecting a very large number of individuals, such as over 250,000 or 500,000, where the costs of notification would be extremely high. Response: The Act does not waive direct written notice to the individual when a breach has affected a threshold number of individuals and we do not do so in this rule. Comment: One commenter requested confirmation that a covered entity could make multiple attempts to provide direct written notice to individuals within the 60-day timeframe before the individual counts towards the 10 or more threshold for providing substitute Web or media notice. Response: We clarify that a covered entity can attempt to cure out-of-date contact information on individuals when notices are returned as undeliverable by the United States Postal Service to avoid substitute notice so long as a covered entity does so promptly upon receiving the returned notices and no later than 60 calendar days from discovery of the breach. However, at the time the covered entity PO 00000 Frm 00088 Fmt 4701 Sfmt 4700 is aware that it will be unable to reach 10 or more individuals with direct written notice, the covered entity should provide substitute Web or media notice as soon as reasonably possible thereafter, which may be prior to the end of the 60-day period depending on the circumstances. Comment: One commenter stated that the required content of the breach notice itself, when made available to the public through the Web or media, could lead to the identification of individuals affected by the breach in some cases, undermining the intent of HIPAA’s privacy and security protections. Response: It is unclear the circumstances to which the commenter refers. For example, the notification must include the types of protected health information involved (e.g., social security numbers, dates of birth, full names). However, this is not a requirement to include in the notice the actual names or other identifiers of the affected individuals. We believe covered entities are able to post breach notices in a manner that does not identify particular individuals affected by a breach and thus, must do so. Comment: One commenter asked that OCR engage in an educational campaign to ensure that covered entities and business associates understand their obligations under the breach notification rule. Response: Published guidance is the primary method that the Department uses to educate and provide technical assistance to covered entities and business associates. We intend to issue guidance on these requirements in the future as questions are raised or clarifications sought. 3. Section 164.406—Notification to the Media Section 13402(e)(2) of the HITECH Act, implemented at § 164.406 of the interim final rule, requires that a covered entity provide notice of a breach to prominent media outlets serving a State or jurisdiction, following the discovery of a breach if the unsecured protected health information of more than 500 residents of such State or jurisdiction is, or is reasonably believed to have been, accessed, acquired, or disclosed during such breach. This media notice is in addition to, not a substitute for, individual notice. In accordance with the Act, § 164.406(b) of the interim final rule required covered entities to notify prominent media outlets without unreasonable delay and in no case later than 60 calendar days after discovery of the breach. Section 164.406(c) of the interim final rule required that the E:\FR\FM\25JAR2.SGM 25JAR2 sroberts on DSK5SPTVN1PROD with Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations notification to the media include the same information required to be included in the notification to the individual under § 164.404(c). The interim final rule did not define ‘‘prominent media outlet’’ because what constitutes a prominent media outlet will differ depending upon the State or jurisdiction affected. For a breach affecting more than 500 individuals across a particular state, a prominent media outlet may be a major, general interest newspaper with a daily circulation throughout the entire state. In contrast, a newspaper serving only one town and distributed on a monthly basis, or a daily newspaper of specialized interest (such as sports or politics) would not be viewed as a prominent media outlet. Where a breach affects more than 500 individuals in a limited jurisdiction, such as a city, then a prominent media outlet may be a major, general-interest newspaper with daily circulation throughout the city, even though the newspaper does not serve the whole State. With regard to the term ‘‘State,’’ the existing definition of ‘‘State’’ at § 160.103 of the HIPAA Rules applies. Section § 160.103 defines ‘‘State’’ to mean ‘‘any one of the several States, the District of Columbia, the Commonwealth of Puerto Rico, the Virgin Islands, and Guam.’’ We also expressly provided in the regulation that ‘‘State’’ for purposes of notice to the media includes American Samoa and the Northern Mariana Islands, because they were included in the HITECH Act’s definition of ‘‘State’’ in addition to what appears in the definition at § 160.103. With respect to what was meant by ‘‘jurisdiction’’ as opposed to a ‘‘State,’’ jurisdiction is a geographic area smaller than a state, such as a county, city, or town. The interim final rule also clarified that some breaches involving more than 500 individuals who are residents in multiple States may not require notice to the media. For example, if a covered entity discovers a breach of 600 individuals, 200 of which reside in Virginia, 200 of which reside in Maryland, and 200 of which reside in the District of Columbia, the breach did not affect more than 500 residents of any one State or jurisdiction, and as such, notification is not required to be provided to the media pursuant to § 164.406. However, individual notification under § 164.404 would be required, as would notification to the Secretary under § 164.408 because the breach involved 500 or more individuals. The Department also recognized that in some cases a breach may occur at a VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 business associate and involve the protected health information of multiple covered entities. In such cases, a covered entity involved would only be required to provide notification to the media if the information breached included the protected health information of more than 500 individuals located in any one State or jurisdiction. For example, if a business associate discovers a breach affecting 800 individuals in a State, the business associate must notify the appropriate covered entity (or covered entities) subject to § 164.410 (discussed below). If 450 of the affected individuals are patients of one covered entity and the remaining 350 are patients of another covered entity, because the breach has not affected more than 500 individuals at either covered entity, there is no obligation to provide notification to the media under this section. Section 164.406(c) requires that the notice to the media include the same content as that required for notification to the individual under § 164.404(c), and we emphasized that this provision does not replace either direct written or substitute notice to the individual under § 164.404. Overview of Public Comments In general, we received few comments on this provision of the interim final rule. One commenter expressed general support for this provision because it does not require the covered entity to incur the cost of printing or running the media notice and asked for clarification that this policy places no requirement on the media to publically report the information provided by a covered entity. Another commenter asked whether a covered entity could fulfill the requirements for providing media notification by posting a press release on the covered entity’s Web site. Final Rule We retain § 164.406 in this final rule with one minor change. As described in Section IV above, to align the definition of ‘‘State’’ in the HIPAA Rules with the definition of the same term used in the HITECH Act, the Department has modified the definition of ‘‘State’’ at § 160.103 to include reference to American Samoa and the Northern Mariana Islands. Given this change, it is not necessary to include specific reference to American Samoa and the Northern Mariana Islands at § 164.406 and we remove it in this final rule. In response to public comments, we clarify that § 164.406 does not require a covered entity to incur any cost to print or run media notice about a breach of unsecured protected health information PO 00000 Frm 00089 Fmt 4701 Sfmt 4700 5653 (unlike the obligations for providing substitute notice to individuals in § 164.404(d)(2) if there is insufficient or out-of-date contact information for 10 or more affected individuals) nor does it obligate prominent media outlets who receive notification of a breach from a covered entity to print or run information about the breach. We also emphasize that posting a press release regarding a breach of unsecured protected health information on the home page of the covered entity’s Web site will not fulfill the obligation to provide notice to the media (although covered entities are free to post a press release regarding a breach on their Web site). To fulfill the obligation, notification, which may be in the form of a press release, must be provided directly to prominent media outlets serving the State or jurisdiction where the affected individuals reside. 4. Section 164.408—Notification to the Secretary Section 13402(e)(3) of the HITECH Act requires covered entities to notify the Secretary of breaches of unsecured protected health information. The Act requires covered entities to report breaches affecting 500 or more individuals to the Secretary immediately. For breaches affecting fewer than 500 individuals, covered entities may maintain a log of all such breaches occurring during the year and annually submit such log to the Secretary. To implement the statutory provisions, § 164.408(a) contains the general rule that requires a covered entity to notify the Secretary following the discovery of a breach of unsecured protected health information. With respect to breaches involving 500 or more individuals, we interpreted the term ‘‘immediately’’ in the statute to require notification be sent to the Secretary concurrently with the notification sent to the individual under § 164.404 (i.e., without unreasonable delay but in no case later than 60 calendar days following discovery of a breach). The rule provided that these notifications be provided in a manner to be specified on the HHS Web site. Further, as required by section 13402(e)(4) of the Act, the interim final rule stated that the Secretary would begin to post and maintain on the HHS Web site a list of covered entities that submit reports of breaches of unsecured protected health information involving more than 500 individuals. Under these provisions, covered entities must notify the Secretary of all discovered breaches involving more than 500 individuals, without regard to E:\FR\FM\25JAR2.SGM 25JAR2 5654 Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations sroberts on DSK5SPTVN1PROD with whether the breach involved more than 500 residents of a particular State or jurisdiction (the threshold for triggering notification to the media under § 164.406 of the interim final rule). Thus, where a covered entity has discovered a breach involving 600 individuals, 300 of which reside in Maryland and 300 of which reside in the District of Columbia, notification of the breach must be provided to the Secretary concurrently with notification to the affected individuals. However, in this example, the breach would not trigger the requirement to notify the media under § 164.406 because the breach did not involve more than 500 residents of any one State or jurisdiction. For breaches involving less than 500 individuals, § 164.408(c) requires a covered entity to maintain a log or other documentation of such breaches and to submit information annually to the Secretary for breaches occurring during the preceding calendar year. The interim final rule required the submission of this information to the Secretary no later than 60 days after the end of each calendar year. As with notification of the larger breaches, the interim final rule required that information about breaches involving less than 500 individuals be provided to the Secretary in the manner specified on the HHS Web site. Although covered entities need only provide notification to the Secretary of breaches involving less than 500 individuals annually, they must still provide notification of such breaches to affected individuals without unreasonable delay and not later than 60 days after discovery of the breach pursuant to § 164.404. In addition, pursuant to § 164.414(a), a covered entity must follow the documentation requirements that otherwise apply to the HIPAA Privacy Rule under § 164.530 with respect to the requirements of this rule. Thus, pursuant to § 164.530(j)(2), covered entities must maintain the internal log or other documentation for six years. Further, as with other required documentation, a covered entity must make such information available to the Secretary upon request for compliance and enforcement purposes in accordance with § 160.310. Overview of Public Comments Some commenters expressed concern regarding the timing of providing notification to the Secretary of breaches affecting fewer than 500 individuals. These commenters asked when notification should be provided if a covered entity discovers, after the reporting deadline, a breach that VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 occurred in the previous year. Several others commented on the interim final rule’s process for providing the Secretary with breach notification. Some commenters asked that this process be revised to allow covered entities to maintain a log of all breaches affecting fewer than 500 individuals and then submit that log, via attachment (such as an Excel spreadsheet), to the Secretary on an annual basis. These commenters stated that submitting reports of these smaller breaches in this manner would be much less burdensome than submitting the reports individually. Other commenters asked that we provide a template log for entities to use to document smaller breaches for annual submission to the Secretary. Additionally, several commenters suggested that there be access or authentication controls for submitting breach reports because of concerns of false breach reports being submitted to the Secretary without the covered entity’s knowledge. Final Rule The final rule retains § 164.408(c) with one modification. The modification clarifies that covered entities are required to notify the Secretary of all breaches of unsecured protected health information affecting fewer than 500 individuals not later than 60 days after the end of the calendar year in which the breaches were ‘‘discovered,’’ not in which the breaches ‘‘occurred.’’ We recognize that there may be situations where, despite having reasonable and appropriate breach detection systems in place, a breach may go undetected for some time. In these cases, if a breach of unsecured protected health information affecting fewer than 500 individuals that occurred in the previous year is discovered, the covered entity has until 60 days after the end of the calendar year in which the breach was discovered to provide notice to the Secretary. We emphasize, however, that this modification does not alter a covered entity’s obligation to promptly report the breach to affected individuals without unreasonable delay but in no cases later than 60 calendar days after discovery of the breach. In response to the comments suggesting that covered entities be permitted to submit a log of all smaller breaches to the Secretary instead of submitting each breach individually through the online form, we agree that the current process may be burdensome for some entities and are considering alternative ways to receive such reports. With respect to the commenters who asked that access or authentication PO 00000 Frm 00090 Fmt 4701 Sfmt 4700 controls be added to the breach reporting form, we do not believe this is necessary at the present time. Since the Department began receiving and processing breach reports on September 23, 2009, we have not yet received a report that has been falsely submitted by an individual or entity not acting on behalf of the covered entity. Additionally, we emphasize that following receipt of a breach report that affects 500 or more individuals, we contact the covered entity identified in the breach report and verify the information in the report before we post any information about the breach on the HHS Web site. If circumstances change in the future, we will explore options for modifying the process. Response to Other Public Comments Comment: One commenter asked that the final rule should not interpret the term ‘‘immediately’’ in the statute to mean without unreasonable delay, but in no case later than 60 days, but rather to mean as soon as the breach is discovered. Another commenter asked that the final rule expand the timeframe for providing notification to the Secretary to no later than 120 days after discovery of a breach. Response: We believe that our interpretation of ‘‘immediately’’ with respect to notification to the Secretary for breaches affecting 500 or more individuals is reasonable and appropriate and thus, retain the provision that requires such notice be provided contemporaneously with notice to the individual. Requiring contemporaneous notice allows the notice to the Secretary to include all of the information provided in the notice to the individual and better ensures that a covered entity does not report information to the Secretary that later turns out to be incorrect because the entity did not have sufficient time to conduct an investigation into the facts surrounding the breach. In addition, this interpretation satisfies the statutory requirement that notifications of larger breaches be provided to the Secretary immediately (as they occur) as compared to the reports of smaller breaches the statute allows be reported annually to the Secretary. Comment: Some commenters asked for further guidance on submitting online breach notifications to the Secretary. Additionally, some commenters asked that HHS provide a confirmation to submitters that an initial breach report or an addendum to a breach report has been successfully submitted. Response: Since the publication of the interim final rule, OCR has posted E:\FR\FM\25JAR2.SGM 25JAR2 sroberts on DSK5SPTVN1PROD with Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations instructions for filling out and submitting the breach form on its Web site: https://www.hhs.gov/ocr/privacy/ hipaa/administrative/ breachnotificationrule/ brinstruction.html. We will continue to examine the instructions for submitting breach notification to the Secretary and will update this information, as necessary, to ensure that covered entities are able to navigate and submit the form easily. The Department has also made changes to the process to ensure that covered entities receive a confirmation following their submission of breach notification to the Secretary. Additionally, we note that the breach reporting form does include an option for indicating that a submission is an addendum to a previous submission. OCR updates the original breach report, as appropriate, with any additional or modified information submitted in an addendum. Comment: With respect to the posting of breaches affecting 500 or more individuals on the HHS Web site, some commenters stated that these breach submissions must be verified with the covered entity before they are posted publicly. Other commenters asked for clarification of what information will be posted, while another commenter asked that we post only the name of the covered entity involved in the breach. Finally, one commenter suggested that we only post these breaches on our Web site for a six month period. Response: To provide helpful information to the public, OCR currently posts the following information regarding breaches affecting 500 or more individuals: name of the covered entity (and if applicable, the business associate) involved; State where the covered entity is located; number of individuals affected by the breach; the date of the breach; type of breach (e.g., theft, loss, unauthorized access/disclosure); and location of the breached information (e.g., laptop, paper records, desktop computer). Prior to posting this information, OCR verifies the information in the breach notification report with the covered entity. We do not believe it would serve the public to only disclose the name of the covered entity involved in each of the breaches, because the additional information enables members of the public to understand the nature of the breach and to determine if the breach affects them directly. In terms of how long information about each of the breaches is to remain posted, we intend to maintain the information on our Web site for as long as there is public interest and the data can remain posted in a VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 manner that gives the public access effectively and efficiently. 5. Section 164.410—Notification by a Business Associate Interim Final Rule Section 13402(b) of the HITECH Act requires a business associate of a covered entity that accesses, maintains, retains, modifies, records, destroys, or otherwise holds, uses, or discloses unsecured protected health information to notify the covered entity when it discovers a breach of such information. The Act requires business associates to provide such notification to covered entities without unreasonable delay and in no case later than 60 days from discovery of the breach. Additionally, the Act requires business associates to provide covered entities with the identity of each individual whose unsecured protected health information has, or is reasonably believed to have been, affected by the breach. Section 164.410(a) implements section 13402(b) of the Act. A business associate is required to notify the covered entity of the breach of unsecured protected health information so that the covered entity can notify affected individuals. In the interim final rule, we clarified that a business associate that maintains the protected health information of multiple covered entities need notify only the covered entity(s) to which the breached information relates. However, in cases in which a breach involves the unsecured protected health information of multiple covered entities and it is unclear to whom the breached information relates, it may be necessary to notify all potentially affected covered entities. Section 164.410(a)(2) provides that a breach shall be treated as discovered by a business associate as of the first day on which such breach is known to the business associate or, by exercising reasonable diligence, would have been known to the business associate. As with a covered entity, a business associate shall be deemed to have knowledge of a breach if the breach is known, or by exercising reasonable diligence would have been known, to any person, other than the person committing the breach, who is an employee, officer, or other agent of the business associate (determined in accordance with the Federal common law of agency). Similarly, as with knowledge imputed to covered entities, the Federal common law of agency controls in determining who is an agent of the business associate. PO 00000 Frm 00091 Fmt 4701 Sfmt 4700 5655 Section 164.410(b) requires that a business associate provide notice of a breach of unsecured protected health information to a covered entity without unreasonable delay and in no case later than 60 days following the discovery of a breach. With respect to timing, if a business associate is acting as an agent of a covered entity, then, pursuant to § 164.404(a)(2), the business associate’s discovery of the breach will be imputed to the covered entity. In such circumstances, the covered entity must provide notifications under § 164.404(a) based on the time the business associate discovers the breach, not from the time the business associate notifies the covered entity. In contrast, if the business associate is not an agent of the covered entity, then the covered entity is required to provide notification based on the time the business associate notifies the covered entity of the breach. We encouraged covered entities and business associates to address the timing of this notification in their business associate contracts. Section 164.410(c)(1) requires business associates, to the extent possible, to provide covered entities with the identity of each individual whose unsecured protected health information has been, or is reasonably believed to have been, breached. Depending on the circumstances, business associates could provide the covered entity with immediate notification of the breach and then follow up with the required information in § 164.410(c) when available but without unreasonable delay and within 60 days. Section 164.410(c)(1) requires business associates to provide this information ‘‘to the extent possible,’’ recognizing that there may be situations in which a business associate may be unaware of the identification of the individuals whose unsecured protected health information was breached. For example, a business associate that is a record storage company that holds hundreds of boxes of paper medical records on behalf of a covered entity may be unaware of the names of the individuals whose records are stored. Thus, if the business associate discovers that several boxes are missing, it may be unable to provide the covered entity with a list of the individuals whose information has been breached. In such circumstances, it is not our intent that the business associate delay notification of the breach to the covered entity, when the covered entity may be better able to identify the individuals affected. Depending on the circumstances surrounding a breach of unsecured protected health information, a business E:\FR\FM\25JAR2.SGM 25JAR2 5656 Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations sroberts on DSK5SPTVN1PROD with associate may be in the best position to gather the information the covered entity is required by § 164.404(c) to include in the notification to the individual about the breach. Therefore, in addition to the identification of affected individuals, § 164.410(c)(2) requires a business associate to provide the covered entity with any other available information that the covered entity is required to include in the notification to the individual under § 164.404(c), either at the time it provides notice to the covered entity of the breach or promptly thereafter as information becomes available. Because we allow this information to be provided to a covered entity after the initial notification of the breach as it becomes available, a business associate should not delay the initial notification to the covered entity of the breach in order to collect information needed for the notification to the individual. To ensure the covered entity is aware of all the available facts surrounding a breach, the Rule also requires that a business associate provide this information even if it becomes available after notifications have been sent to affected individuals or after the 60-day period specified in § 164.410(b) has elapsed. We clarified that business associates and covered entities would continue to have the flexibility to set forth specific obligations for each party, such as who will provide notice to individuals and when the notification from the business associate to the covered entity will be required, following a breach of unsecured protected health information, so long as all required notifications are provided and the other requirements of the interim final rule were met. We encouraged the parties to consider which entity is in the best position to provide notice to the individual, which may depend on circumstances, such as the functions the business associate performs on behalf of the covered entity and which entity has the relationship with the individual. We also encouraged the parties to ensure the individual does not receive notifications from both the covered entity and the business associate about the same breach, which may be confusing to the individual. Overview of Public Comments Many commenters expressed concern over the interim final rule’s treatment of a covered entity’s knowledge of a breach that occurs at or by a business associate. Some commenters stated that a covered entity’s knowledge of a breach should begin when the business associate notifies them of the breach, regardless of whether the business associate is an agent of the covered entity or a non- VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 agent independent contractor. If knowledge is imputed when the business associate discovers the breach, one commenter argued that a covered entity would not have sufficient time to provide the required notifications to individuals in a timely manner. Other commenters argued that all business associates should be treated as agents of the covered entity, such that the business associate’s knowledge of a breach is imputed to the covered entity. Finally, some commenters asked for more guidance on when a business associate is acting as an agent versus as an independent contractor and how to determine this status under the Federal common law of agency. Final Rule The final rule modifies § 164.410 only to make the following technical and non-substantive correction: in paragraph (a)(2) of § 164.410, the first sentence is revised to refer to paragraph (a)(1) rather than paragraph (1). With respect to the commenters who expressed concern that a covered entity’s knowledge of a breach depends not only on a business associate’s discovery of the breach but also on the covered entity’s relationship with the business associate, we acknowledge that there are many different types of relationships that can develop between covered entities and business associates based upon the function the business associate performs on behalf of the covered entity. In some situations, a business associate will be acting as an agent of the covered entity, and as such, it makes sense to treat the business associate’s knowledge of a breach analogous to the knowledge of one of the covered entity’s own employees. However, in other situations, because a business associate may not be an agent of the covered entity, it would not be reasonable to impute the business associate’s knowledge directly to the covered entity, and therefore, the covered entity’s knowledge depends on notification from the business associate. Furthermore, the use of the Federal common law of agency to determine the business associate’s status with respect to the covered entity is consistent with the approach taken in the Enforcement Rule for determining agency liability under the HIPAA Rules. Thus, we believe the use of the standard is appropriate here and should be familiar to most entities. We provide additional guidance regarding who is an agent above in our response to comments on the HITECH modifications to the HIPAA Enforcement Rule. Because of the agency implications on the timing of breach notifications, we encourage PO 00000 Frm 00092 Fmt 4701 Sfmt 4700 covered entities to discuss and define in their business associate agreements the requirements regarding how, when, and to whom a business associate should notify the covered entity of a potential breach. Response to Other Public Comments Comment: Several commenters asked OCR to provide sample business associate agreement language to outline the covered entity’s and business associate’s obligations following a breach of unsecured protected health information. Response: A covered entity’s and business associate’s obligations following a breach of unsecured protected health information will vary depending on the relationship. For example, whether a business associate will send the breach notices to affected individuals and/or to notify the Secretary (and media, if applicable) on behalf of a covered entity is a business decision of the parties and how quickly a business associate is to notify a covered entity of a breach within the required timeframe may be based on a number of factors, such as whether the business associate is an agent of the covered entity. However, to help covered entities and business associates implement the new business associate agreement requirements generally under the HITECH modifications to the HIPAA Rules, the Department has published sample business associate agreement provisions on its web site. Comment: Some commenters asked what happens if a covered entity and a business associate disagree about whether an impermissible use or disclosure is a breach that requires notification. These commenters asked if both parties must be in agreement before breach notification obligations are triggered. Response: The covered entity is ultimately responsible for providing individuals with notification of breaches and, as indicated above, the clock for notifying individuals of breaches begins upon knowledge of the incident, even if it is not yet clear whether the incident qualifies as a breach for purposes of this rule. Further, this final rule clarifies that the default presumption is that an impermissible use or disclosure is a breach unless it can be determined through a risk assessment that there is a low probability that the data may be compromised. This standard should allow for more uniform application of the risk assessment approach across covered entities and business associates. Comment: One commenter stated that the requirement that a business E:\FR\FM\25JAR2.SGM 25JAR2 Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations associate notify a covered entity of a breach of unsecured protected health information is duplicative of a business associate’s other obligations to notify the covered entity of privacy violations and security incidents. Response: Business associates are required to report to covered entities any security incidents or uses or disclosures of protected health information not provided for by their business associate agreements, which include but are broader than breaches of unsecured protected health information under this Rule. For example, a security incident need not lead to unauthorized access to protected health information (and thus, is not a breach) but is still an event that should be reported to the covered entity. Further, when a security incident occurs that does rise to the level of a breach, the breach notice to the covered entity suffices to meet the requirement to report the security incident to the covered entity (however, a covered entity may require through the business associate agreement that additional information be reported). Therefore, these requirements are not duplicative. Similarly, § 164.412(b), based on 45 CFR 164.528(a)(2)(ii) of the Privacy Rule, requires a covered entity or business associate to temporarily delay a notification, notice, or posting if a law enforcement official states orally that a notification would impede a criminal investigation or cause damage to national security. However, in this case, the covered entity or business associate must document the statement and the identity of the official and delay notification for no longer than 30 days, unless a written statement meeting the above requirements is provided during that time. We interpreted these provisions as tolling the time within which notification is required under §§ 164.404, 164.406, 164.408, and 164.410, as applicable. 6. Law Enforcement Delay Section 164.414(a) requires covered entities to comply with the administrative requirements of § 164.530(b), (d), (e), (g), (h), (i), and (j) of the Privacy Rule with respect to the breach notification provisions of this subpart. These Privacy Rule provisions, for example, require covered entities and business associates to develop and document policies and procedures, train workforce members on and have sanctions for failure to comply with these policies and procedures, permit individuals to file complaints regarding these policies and procedures or a failure to comply with them, and require covered entities to refrain from intimidating or retaliatory acts. Thus, a covered entity is required to consider and incorporate the breach notification requirements with respect to its administrative compliance and other obligations. Section 164.414(b) provides that, following an impermissible use or disclosure under the Privacy Rule, covered entities and business associates have the burden of demonstrating that all notifications were made as required by this subpart. Additionally, as part of demonstrating that all required notifications were made, a covered entity or business associate, as applicable, also must be able to demonstrate that an impermissible use or disclosure did not constitute a breach, as such term is defined at sroberts on DSK5SPTVN1PROD with Interim Final Rule Section 13402(g) of the HITECH Act provides that if a law enforcement official determines that a notification, notice, or posting required under this section would impede a criminal investigation or cause damage to national security, such notification, notice, or posting shall be delayed in the same manner as provided under 45 CFR 164.528(a)(2) of the Privacy Rule in the case of a disclosure covered under such section. Section 164.412 implements section 13402(g) of the Act, requiring a covered entity or business associate to temporarily delay notification to the individual, the media (if applicable), to a covered entity by a business associate, and to the Secretary if instructed to do so by a law enforcement official. Section 164.412(a), based on the requirements of 45 CFR 164.528(a)(2)(i) of the Privacy Rule, provides for a temporary delay of notification in situations in which a law enforcement official provides a statement in writing that the delay is necessary because notification would impede a criminal investigation or cause damage to national security, and specifies the time for which a delay is required. In such instances, the covered entity is required to delay the notification, notice, or posting for the time period specified by the official. VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 Final Rule The Department did not receive public comments on this provision of the interim final rule. We retain § 164.412 in this final rule without modification. 7. Section 164.414—Administrative Requirements and Burden of Proof Interim Final Rule PO 00000 Frm 00093 Fmt 4701 Sfmt 4700 5657 § 164.402, in cases where the covered entity or business associate determined that notifications were not required. To conform to these provisions, § 160.534 of the HIPAA Enforcement Rule makes clear that, during any administrative hearing, the covered entity has the burden of going forward and the burden of persuasion with respect to these issues. Thus, when a covered entity or business associate knows of an impermissible use or disclosure of protected health information, it should maintain documentation that all required notifications were made, or, alternatively, to demonstrate that notification was not required: (1) Its risk assessment (discussed above in § 164.402) demonstrating a low probability that the protected health information has been compromised by the impermissible use or disclosure or (2) the application of any other exceptions to the definition of ‘‘breach.’’ Overview of Public Comments One commenter stated that it is critical that all employees are trained and knowledgeable about what constitutes a breach, so that the covered entity or business associate can provide the required notifications within the required timeframe. The commenter also maintained that OCR should emphasize the necessity of this training. With respect to the burden of proof placed upon covered entities and business associates, one commenter agreed that covered entities and business associates should have the burden to demonstrate that all notifications were provided following a breach of unsecured protected health information. However, the commenter asked that we include a presumption that an impermissible use or disclosure of protected health information did not constitute a breach if a covered entity or business associate has implemented a breach notification policy, completed a risk assessment, and documented that it followed its policy in reaching a conclusion that breach notification was not required. Final Rule We retain § 164.414 in this final rule without modification. We emphasize the importance of ensuring that all workforce members are appropriately trained and knowledgeable about what constitutes a breach and on the policies and procedures for reporting, analyzing, and documenting a possible breach of unsecured protected health information. We note that because this final rule modifies the definition of breach as stated in the interim final rule, covered E:\FR\FM\25JAR2.SGM 25JAR2 5658 Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations entities will need to update their policies and procedures and retrain workforce members as necessary to reflect such modifications. With respect to this burden of proof, section 13402 of the statute places the burden of proof on a covered entity or business associate, if applicable, to demonstrate that all notifications were made as required. Therefore, section 164.530(j)(1)(iv) requires covered entities to maintain documentation to meet this burden of proof. This includes documentation that all required notifications have been provided or that no breach occurred and notification was not necessary. If a covered entity’s determination with respect to whether a breach occurred is called into question, the covered entity should produce the documentation that demonstrates the reasonableness of its conclusions based on the findings of its risk assessment. 8. Technical Corrections The interim final rule made several technical changes to align the HIPAA Rules in light of the new breach notification requirements of subpart D. See 74 FR 42755–56. We did not receive comments on these changes. We retain the technical corrections made in the interim final rule and also make an additional technical correction by adding ‘‘and’’ to the end of § 160.534(b)(1)(iii) to make clear the relationship between § 160.534(b)(1)(iii) and the new § 160.534(b)(1)(iv). 9. Preemption sroberts on DSK5SPTVN1PROD with Interim Final Rule The interim final rule clarified that contrary State law will be preempted by these breach notification regulations. Section 1178 of the Social Security Act, 42 U.S.C. 1320d–7, which was added by HIPAA, provides that HIPAA administrative simplification provisions generally preempt conflicting State law. Section 160.203 states that a standard, requirement, or implementation specification that is adopted as regulation at 45 CFR parts 160, 162, or 164 and that is ‘‘contrary to a provision of State law preempts the provision of State law.’’ Thus, whether a State law is contrary to these breach notification regulations is to be determined based on the definition of ‘‘contrary’’ at § 160.202, which states that a State law is contrary if ‘‘[a] covered entity would find it impossible to comply with both the State and Federal requirements’’ or if the State law ‘‘stands as an obstacle to the accomplishment and execution of the full purposes and objectives’’ of the breach notification provisions in the Act. Covered entities must analyze VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 relevant State laws with respect to the breach requirements to understand the interaction and apply this preemption standard appropriately. In the interim final rule, we stated our belief that, in general, covered entities can comply with both the applicable State laws and this regulation and that in most cases, a single notification can satisfy the notification requirements under State laws and this regulation. For example, if a State breach notification law requires notification be sent to the individual in a shorter time frame than is required by this regulation, a covered entity that sends the notice within the time frame required by the State law will also be in compliance with this regulation’s timeliness requirements. Additionally, since the Act and rule are flexible in terms of how the elements are to be described, and do not prohibit additional elements from being included in the notice, in general, Federal requirements contain flexibility for covered entities to develop a notice that satisfies both laws. Overview of Public Comments While some commenters were pleased that the breach notification rule preempts conflicting State law, other commenters expressed confusion or concern with this preemption standard. Many commenters stated that despite the fact that in most cases a covered entity may only need to provide one notification to satisfy both State and Federal law, there will be some cases in which a covered entity will have to provide multiple notices to the same individual to ensure compliance with all relevant laws. This will result in confusion for the individual and increased costs for the covered entity. Some of these commenters suggested that this Federal breach notification law should preempt all State breach notification laws, or alternatively, that HHS should work with Congress and the States to harmonize the breach notification laws such that only one notice is required following a breach. Final Rule We maintain the preemption standard discussed in the interim final rule, which is based on section 1128 of the Social Security Act and applies to the HITECH Act’s breach notification provisions by virtue of section 13421 of the HITECH Act. We continue to believe that, generally, covered entities are able to comply with both State and Federal requirements for providing breach notification with one breach notice based on the flexibility provided to entities in this Rule. However, even in PO 00000 Frm 00094 Fmt 4701 Sfmt 4700 the exceptional case, we do not have authority to preempt a State breach notification law that is not contrary to this Rule. 10. Responses to Other Public Comments Comment: One commenter asked whether penalties are automatically assessed following a violation of the breach notification rule or if this is done at OCR’s discretion and whether civil money penalties can be assessed for the underlying cause of a breach of unsecured protected health information where a covered entity has provided all required breach notifications. Response: OCR’s enforcement of the breach notification rule will be carried out pursuant to the Enforcement Rule. Pursuant to the Enforcement Rule, OCR may impose a civil money penalty for a failure to comply with the breach notification rule. OCR also has the discretion to work with the covered entity to achieve voluntary compliance through informal resolution, except in cases in which it has found a violation due to willful neglect. Because every breach of unsecured protected health information must have an underlying impermissible use or disclosure under the Privacy Rule, OCR also has the authority to impose a civil money penalty for the underlying Privacy Rule violation, even in cases where all required breach notifications were provided. VI. Modifications to the HIPAA Privacy Rule Under GINA A. Background The Genetic Information Nondiscrimination Act of 2008 (‘‘GINA’’), Public Law 110–233, 122 Stat. 881, prohibits discrimination based on an individual’s genetic information in both the health coverage and employment contexts. With respect to health coverage, Title I of GINA generally prohibits discrimination in premiums or contributions for group coverage based on genetic information, proscribes the use of genetic information as a basis for determining eligibility or setting premiums in the individual and Medicare supplemental (Medigap) insurance markets, and limits the ability of group health plans, health insurance issuers, and Medigap issuers to collect genetic information or to request or require that individuals undergo genetic testing. Title II of GINA generally prohibits use of genetic information in the employment context, restricts employers and other entities covered by Title II from requesting, requiring, or purchasing genetic E:\FR\FM\25JAR2.SGM 25JAR2 Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations information, and strictly limits such entities from disclosing genetic information. The Departments of Labor, Treasury, and Health and Human Services (HHS) are responsible for administering and enforcing the GINA Title I nondiscrimination provisions, and the Equal Employment Opportunity Commission (EEOC) is responsible for administering and enforcing the GINA Title II nondiscrimination provisions.13 In addition to these nondiscrimination provisions, section 105 of Title I of GINA contains new privacy protections for genetic information, which require the Secretary of HHS to revise the Privacy Rule to clarify that genetic information is health information and to prohibit group health plans, health insurance issuers (including HMOs), and issuers of Medicare supplemental policies from using or disclosing genetic information for underwriting purposes.14 B. Overview of the Proposed Rule On October 7, 2009, the Department published a notice of proposed rulemaking (NPRM or ‘‘proposed rule’’) to strengthen the privacy protections for genetic information under the HIPAA Privacy Rule by implementing the protections for genetic information required by GINA 15 and making related changes to the Rule. In particular, in accordance with section 105 of GINA and the Department’s general authority under sections 262 and 264 of HIPAA, the Department proposed to: (1) Explicitly provide that genetic information is health information for sroberts on DSK5SPTVN1PROD with 13 The Departments of Labor (Employee Benefits Security Administration), Treasury (Internal Revenue Service), and HHS (Centers for Medicare & Medicaid Services (CMS)) have issued regulations in a separate rulemaking (at 74 FR 51664) to implement sections 101–103 of GINA, which amended: section 702 of the Employee Retirement Income Security Act of 1974 (29 U.S.C. 1182); section 2702 of the Public Health Service Act (42 U.S.C. 300gg–1) (renumbered as section 2705 by the Affordable Care Act); and section 9802 of the Internal Revenue Code of 1986. Section 104 of GINA applies to Medigap issuers, which are subject to the provisions of section 1882 of the Social Security Act that are implemented by CMS, and which incorporate by reference certain provisions in a model regulation of the National Association of Insurance Commissioners (NAIC). The NAIC amended its model regulation on September 24, 2008, to conform to section 104 of GINA, and the amended regulation was published by CMS in the Federal Register on April 24, 2009, at 74 FR 18808. With respect to Title II of GINA, the EEOC issued final regulations on November 9, 2010, at 75 FR 68912. 14 Section 105 of GINA, entitled ‘‘Privacy and Confidentiality,’’ amends Part C of Title XI of the Social Security Act by adding section 1180 to address the application of the HIPAA Privacy Rule to genetic information. 15 Any reference in this preamble to GINA is a reference to Title I of GINA, except as otherwise indicated. VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 purposes of the Privacy Rule; (2) prohibit all health plans covered by the HIPAA Privacy Rule from using or disclosing protected health information that is genetic information for underwriting purposes; (3) revise the provisions relating to the Notice of Privacy Practices for health plans that perform underwriting; (4) make a number of conforming changes to definitions and other provisions of the Rule; and (5) make technical corrections to update the definition of ‘‘health plan.’’ The 60-day public comment period for the proposed rule closed on December 7, 2009, and the Department received approximately twenty-five comments in response to its proposal.16 After considering the public comments, the Department is issuing this final rule to strengthen the privacy protections for genetic information in accordance with GINA and the Department’s general authority under sections 262 and 264 of HIPAA. In developing this rule, the Department consulted with the Departments of Labor and Treasury, as required by section 105(b)(1) of GINA, to ensure, to the extent practicable, consistency across the regulations. In addition, the Department coordinated with the EEOC in the development of these regulations. The provisions of the proposed rule and the public comments received that were within the scope of the proposed rule are described in more detail below in the section-by-section description of the final rule. C. Section-by-Section Description of Final Rule and Response to Public Comments 1. Scope: Extension of Required Protections to All Health Plans Subject to the HIPAA Privacy Rule Proposed Rule Section 105 of GINA requires HHS to modify the Privacy Rule to prohibit ‘‘a covered entity that is a group health plan, health insurance issuer that issues health insurance coverage, or issuer of a medicare [sic] supplemental policy’’ from using or disclosing genetic information for underwriting purposes. Section 105 of GINA provides that the terms ‘‘group health plan’’ and ‘‘health insurance coverage’’ have the meanings given such terms under section 2791 of the Public Health Service Act (PHSA) (42 U.S.C. 300gg–91), and that the term ‘‘medicare [sic] supplemental policy’’ has the meaning given such term in section 1882(g) of the Social Security 16 The public comments are available at https:// www.regulations.gov. PO 00000 Frm 00095 Fmt 4701 Sfmt 4700 5659 Act. In addition, the term ‘‘health insurance issuer,’’ as defined at 42 U.S.C. 300gg–91, includes a health maintenance organization (HMO). These four types of entities (i.e., group health plans, health insurance issuers, and health maintenance organizations, as defined in the PHSA, as well as issuers of Medicare supplemental policies), correspond to the types of covered entities listed at subparagraphs (i) through (iii) and (vi) of paragraph (1) of the definition of ‘‘health plan’’ at § 160.103 in the HIPAA Privacy Rule, issued under HIPAA’s Administrative Simplification provisions. These also are the entities to which HIPAA’s nondiscrimination provisions apply and to which the nondiscrimination provisions of GINA Title I were directed. However, in addition to these four types of entities, the HIPAA Privacy Rule also includes a number of other entities within the definition of ‘‘health plan’’: (1) Long-term care policies (excluding nursing home fixedindemnity policies); (2) employee welfare benefit plans or other arrangements that are established or maintained for the purpose of offering or providing health benefits to the employees of two or more employers (to the extent that they are not group health plans or health insurance issuers); (3) high risk pools that are mechanisms established under State law to provide health insurance coverage or comparable coverage to eligible individuals; (4) certain public benefit programs, such as Medicare Part A and B, Medicaid, the military and veterans’ health care programs, the Indian Health Service program, and others; as well as (5) any other individual or group plan, or combination of individual or group plans that provides or pays for the cost of medical care (as the term ‘‘medical care’’ is defined in section 2791(a)(2) of the PHSA, 42 U.S.C. 300gg–91(a)(2)). This last category includes, for example, certain ‘‘excepted benefits’’ plans described at 42 U.S.C. 300gg–91(c)(2), such as limited scope dental or vision benefits plans. See the definition of ‘‘health plan’’ at § 160.103. In the NPRM, the Department, using both its authority under GINA as well as its broad authority under HIPAA, proposed to apply the prohibition on using and disclosing protected health information that is genetic information for underwriting to all health plans that are subject to the Privacy Rule, rather than solely to the plans GINA explicitly requires be subject to the prohibition. As explained in the proposed rule, the HIPAA Administrative Simplification provisions provide the Secretary with E:\FR\FM\25JAR2.SGM 25JAR2 5660 Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations sroberts on DSK5SPTVN1PROD with broad authority to craft privacy standards that uniformly apply to all health plans, regardless of whether such health plans are governed by other portions of the HIPAA statute. In addition, the Department indicated in the proposed rule that nothing in GINA explicitly or implicitly curtails this broad authority of the Secretary to promulgate privacy standards for any and all health plans that are governed by the HIPAA Administrative Simplification provisions. Under the Privacy Rule, and consistent with HIPAA, an individual’s privacy interests and rights with respect to the use and disclosure of protected health information are protected uniformly without regard to the type of health plan that holds the information. Thus, under the Privacy Rule, individuals can expect and benefit from privacy protections that do not diminish based on the type of health plan from which they obtain health coverage. In developing the proposed rule, the Department believed that individuals’ interests in uniform protection under the Privacy Rule against the use or disclosure of their genetic information for underwriting purposes would outweigh any adverse impact on health plans that are not covered by GINA, particularly since it was not expected that all of the health plans subject to the Privacy Rule use or disclose protected health information that is genetic information for underwriting (or even perform underwriting generally, in the case of some of the public benefit plans). For these reasons, the Department proposed to apply the prohibition on using or disclosing protected health information that is genetic information for underwriting purposes to all health plans that are HIPAA covered entities. Overview of Public Comments The Department received comments both in support of and against the proposed application of the prohibition on using or disclosing genetic information for underwriting purposes to all health plans covered by the Privacy Rule. Several commenters agreed that the extension of the proposed requirements to all health plans is an appropriate exercise of the Secretary’s discretion under HIPAA and is necessary to protect the privacy interests of all individuals without regard to the type of health plan holding individuals’ health information, and stated that such an extension would further encourage individuals to take advantage of genetic services. In addition, one commenter in support of the proposal indicated that sixteen VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 States also regulate the use of genetic information in disability insurance, and ten States regulate its use in long-term care insurance, and it is expected that these numbers will continue to increase. The commenter stated that as States move forward in this area it was appropriate for the Federal government to do so as well. However, this and one other commenter, while generally in support of extending the prohibition on using or disclosing genetic information for underwriting to all health plans, also recommended that the Department monitor the impact of such a prohibition on long-term care insurers. A few commenters did not support the Department’s proposal and argued that the prohibition against using or disclosing genetic information for underwriting purposes in the Privacy Rule should apply only to those plans to which GINA expressly applies. Commenters argued that applying the prohibition beyond the health plans identified in GINA was contrary to GINA and its intent. Certain commenters expressed particular disagreement and concern with applying the prohibition on the use of genetic information for underwriting to long-term care insurers. One commenter argued that there was clear Congressional intent in the legislative history of GINA to exempt ‘‘excepted benefits,’’ particularly long-term care insurance, from any prohibitions under GINA and thus, the Privacy Rule should not apply the prohibition on underwriting with genetic information to issuers of long term care policies. The commenter also argued that the GINA prohibition should not apply to longterm care insurers because long-term care plans have different characteristics from other health plans and applying the GINA prohibition to long-term care insurers would jeopardize the ability of long-term care insurers to adequately underwrite and thus, the viability of the long-term care insurance market. The commenter explained that this would be due to the fact that when underwriting, long term care insurers look to determine an individual’s probability of needing long-term care in the future and diagnosis of a particular condition is not the only way this may be determined and in some cases may not even be relevant to such a determination. The Department also heard similar concerns about the potential negative impact of an underwriting prohibition on the economic viability of the long-term market, from certain members of Congress who wrote to the Secretary on this issue, as well as from certain outside parties during fact finding meetings held by the Department. PO 00000 Frm 00096 Fmt 4701 Sfmt 4700 Final Rule The final rule adopts the approach of the proposed rule to apply the prohibition on using or disclosing protected health information that is genetic information for underwriting purposes to all health plans that are covered entities under the HIPAA Privacy Rule, including those to which GINA does not expressly apply, except with regard to issuers of long term care policies. We continue to disagree with the commenters that stated such an extension would conflict with GINA and is outside the scope of our authority. As explained more fully in the proposed rule, the Department has broad authority under HIPAA to regulate a health plan’s uses and disclosures of protected health information, including genetic information, to protect an individual’s privacy interests. See 74 FR 51698, 51699–51700. It does not follow that by exempting ‘‘excepted benefits’’ from the prohibitions under GINA that Congress intended to restrict the Department’s broad authority under HIPAA. Further, there is no conflict with GINA in extending the same privacy protections outlined in GINA to those health plans that are not covered by GINA but are otherwise covered by the HIPAA Privacy Rule. GINA and section 264 of HIPAA are not irreconcilably inconsistent but rather operate concurrently without conflict. Lastly, GINA did not override HIPAA, and did not displace the Department’s authority to prohibit uses and disclosures of genetic information that GINA does not otherwise prohibit. Therefore, nothing in GINA explicitly or implicitly curtails the broad authority of the Secretary to promulgate privacy standards for any and all health plans that are governed by the HIPAA Administrative Simplification provisions. We also continue to believe that individuals have a strong privacy interest in not having their genetic information used in an adverse manner for underwriting purposes and to believe that this privacy interest outweighs any adverse impact on most health plans covered by the Privacy Rule. With respect to most health plans not subject to GINA, the public comment did not indicate that a prohibition on using genetic information for underwriting would have significant adverse impacts on the viability of these plans. Nor did the public comment generally provide information showing that these health plans actually use or disclose protected health information that is genetic information for underwriting, or plan to E:\FR\FM\25JAR2.SGM 25JAR2 Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations sroberts on DSK5SPTVN1PROD with do so in the future (or even perform underwriting generally, in the case of some of the public benefit plans). However, as indicated above, the Department did hear from a number of sources about the potential adverse impact a prohibition on using genetic information for underwriting would have on the ability of a long-term care insurer to effectively underwrite and thus, on the viability of the long-term care insurance market generally. The Department recognizes the importance of long-term care insurance coverage and the need to ensure its continued availability. The Department also acknowledges that, at this time, it does not have the information necessary to more precisely and carefully measure the extent of such an impact on the long-term market in order to appropriately balance an individual’s privacy interests with such an impact. Thus, this final rule excludes long-term care plans from the underwriting prohibition. While we exempt long-term care plans from the underwriting prohibition in this final rule, we continue to believe an individual has a strong privacy interest in the way his or her genetic information is used for the underwriting of long-term care insurance. At the current time, however, we do not have sufficient information to determine the proper balance between the individual’s privacy interests and the industry’s concerns about the cost effects of excluding genetic information. For that reason, we are looking into ways to obtain further information on this issue, such as through a study by the National Association of Insurance Commissioners (NAIC) on the tension between the use of genetic information for underwriting and the associated privacy concerns in the context of their model long-term care rules. Based on the information the Department may obtain, the Department will reassess how best to move forward in this area in the future. Long-term care plans, while not subject to the underwriting prohibition, continue to be bound by the Privacy Rule, as are all other covered health plans, to protect genetic information from improper uses and disclosures, and to only use or disclose genetic information as required or expressly permitted by the Rule, or as otherwise authorized by the individual who is the subject of the genetic information. 2. Section 160.101—Statutory Basis and Purpose We have revised § 160.101, which describes the statutory basis of the HIPAA Rules, to include a reference to section 1180 of the Social Security Act, VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 as added by section 105 of GINA (Pub. L. 110–233). 3. Section 160.103—Definitions The final rule modifies § 160.103 of the Privacy Rule to: (1) Revise the definition of ‘‘health information’’ to make clear that the term includes ‘‘genetic information;’’ (2) add definitions for the GINA-related terms of ‘‘family member,’’ ‘‘genetic information,’’ ‘‘genetic services,’’ ‘‘genetic test,’’ and ‘‘manifestation or manifested;’’ and (3) make technical corrections to the definition of ‘‘health plan.’’ With respect to the GINA-related terms, the final rule adopts definitions that are generally consistent with the definitions of such terms promulgated in the implementing regulations for sections 101–103 of GINA. This will facilitate compliance for those health plans subject to both the privacy as well as the nondiscrimination provisions of GINA. a. Definition of ‘‘Health information’’ Proposed Rule Prior to enactment of GINA, the Department issued guidance that genetic information is health information protected by the Privacy Rule to the extent that such information is individually identifiable and held by a covered entity (subject to the general exclusions from the definition of ‘‘protected health information’’).17 Section 105 of GINA requires the Secretary to revise the Privacy Rule to make clear that genetic information is health information under the Rule. Thus, the Department proposed to modify the definition of ‘‘health information’’ at § 160.103 to explicitly provide that such term includes genetic information. Overview of Public Comments The Department received a few comments expressing specific support for and one comment against the proposed inclusion of the term ‘‘genetic information’’ in the definition of ‘‘health information.’’ The commenters supporting the revision to the definition of ‘‘health information’’ indicated that such an inclusion was necessary to clarify that genetic information is health 17 See, e.g., Frequently Asked Question number 354, available at https://www.hhs.gov/ocr/privacy/ hipaa/faq/protected_health_information/354.html, which states: Question: Does the HIPAA Privacy Rule protect genetic information? Answer: Yes, genetic information is health information protected by the Privacy Rule. Like other health information, to be protected it must meet the definition of protected health information: it must be individually identifiable and maintained by a covered health care provider, health plan, or health care clearinghouse. See also 45 CFR 160.103. PO 00000 Frm 00097 Fmt 4701 Sfmt 4700 5661 information. The commenter against the proposed inclusion to the definition argued that although GINA directs the Department to treat genetic information as health information, the language of GINA does not require a change to the definition of ‘‘health information,’’ and this change would create costs for health plans, which would have to update all their policies and procedures to reflect the change. Final Rule The final rule adopts the proposed modification to the definition of ‘‘health information’’ at § 160.103. This modification to the definition is a necessary clarification to the Privacy Rule based on the statutory language. Given that revising the definition of ‘‘health information’’ to include genetic information does not substantively change the scope of the Privacy Rule, it is unclear why such a change alone would require revisions to a health plan’s policies and procedures. Health plans that perform underwriting will otherwise need to revise their policies and procedures as necessary to comply with this final rule, as well as the modifications to the HIPAA Rules required by the Health Information Technology for Economic and Clinical Health (HITECH) Act. Thus, to the extent the concern about this modification stems from the fact that a health plan’s policies and procedures quote the prior regulatory definition of ‘‘health information,’’ the health plan can revise the definition at the time it is otherwise updating its policies and procedures to comply with these rules. b. Definition of ‘‘Genetic Information’’ Proposed Rule The term ‘‘genetic information’’ is defined in GINA and establishes what information is protected by the statute. Section 105 of GINA provides that the term ‘‘genetic information’’ in section 105 shall have the same meaning given the term in section 2791 of the PHSA (42 U.S.C. 300gg–91), as amended by section 102 of GINA. Section 102(a)(4) of GINA defines ‘‘genetic information’’ to mean, with respect to any individual, information about: (1) Such individual’s genetic tests; (2) the genetic tests of family members of such individual; and (3) the manifestation of a disease or disorder in family members of such individual (i.e., family medical history). GINA also provides that the term ‘‘genetic information’’ includes, with respect to any individual, any request for, or receipt of, genetic services, or participation in clinical research which includes genetic services, by such E:\FR\FM\25JAR2.SGM 25JAR2 5662 Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations individual or family member of such individual. GINA expressly provides that the term ‘‘genetic information’’ shall not include information about the sex or age of any individual. This basic definition of ‘‘genetic information’’ in section 102(a)(4) of GINA (and that is to apply for purposes of section 105) is also expanded by section 102(a)(3), which provides that any reference to genetic information concerning an individual or family member in the PHSA shall include: with respect to an individual or family member of an individual who is a pregnant woman, the genetic information of any fetus carried by such pregnant woman; and with respect to an individual or family member utilizing an assisted reproductive technology, the genetic information of any embryo legally held by the individual or family member. The Department proposed to include this statutory definition of ‘‘genetic information’’ in § 160.103. sroberts on DSK5SPTVN1PROD with Overview of Public Comments Most commenters did not address the proposed definition of ‘‘genetic information’’ in their comments on the proposed rule. However, one commenter stated that it was unclear what information may fall within the scope of the term ‘‘genetic information’’ and whether such term may be construed to include traditional medical information or medical tests used in underwriting today. Final Rule The final rule adopts without modification the definition of ‘‘genetic information’’ proposed in the NPRM. This definition is consistent with the definition found in the implementing regulations for sections 101–103 of GINA and with which compliance is already required by most health plans. The term ‘‘genetic information’’ includes information about the genetic tests of the individual or of the individual’s family members and about diseases or disorders manifested in an individual’s family members (i.e., family health history). Thus, information about manifested diseases, disorders, or conditions of the individual or medical tests that do not meet the rule’s definition of ‘‘genetic test,’’ such as HIV tests, complete blood counts, cholesterol or liver function tests, or tests to detect for the presence of alcohol or drugs, are not genetic information, and such information may be used or disclosed for underwriting purposes. Conversely, family health histories and information about genetic tests, such as tests to determine whether an individual or family member has a VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 gene variant associated with breast cancer, are genetic information, and such information may not be used or disclosed for underwriting purposes. The definitions of ‘‘manifestation or manifested’’ and ‘‘genetic test’’ are discussed more fully below. c. Definition of ‘‘Genetic Test’’ Proposed Rule As explained above, GINA provides that the term ‘‘genetic information’’ includes information about an individual’s genetic tests or the genetic tests of family members of the individual. Section 105 of GINA provides that the term ‘‘genetic test’’ shall have the same meaning as the term has in section 2791 of the PHSA (42 U.S.C. 300gg–91), as amended by section 102 of GINA. Section 102(a)(4) of GINA amends section 2791(d) of the PHSA to define ‘‘genetic test’’ to mean ‘‘an analysis of human DNA, RNA, chromosomes, proteins, or metabolites, that detects genotypes, mutations, or chromosomal changes.’’ GINA further clarifies that the term ‘‘genetic test’’ does not include an analysis of proteins or metabolites that does not detect genotypes, mutations, or chromosomal changes, nor does it include an analysis of proteins or metabolites that is directly related to a manifested disease, disorder, or pathological condition that could reasonably be detected by a health care professional with appropriate training and expertise in the field of medicine involved. Consistent with the statutory definition, the Department proposed to define ‘‘genetic test’’ at § 160.103 as an analysis of human DNA, RNA, chromosomes, proteins, or metabolites, if the analysis detects genotypes, mutations, or chromosomal changes, and to provide in the definition that ‘‘genetic test’’ does not include an analysis of proteins or metabolites that is directly related to a manifested disease, disorder, or pathological condition. While the statute refers to a ‘‘manifested’’ disease as one that could reasonably be detected by a health care professional with appropriate training and expertise in the field of medicine involved, the statute does not define ‘‘manifested.’’ Consequently, for clarity, the Department proposed a definition of ‘‘manifested,’’ as described below. Overview of Public Comments The Department received one comment requesting that the Department include examples within the regulatory text of the definition and another comment stated that it is not PO 00000 Frm 00098 Fmt 4701 Sfmt 4700 clear what constitutes a genetic test under the definition. Final Rule The final rule adopts without modification the definition of ‘‘genetic test’’ as proposed in the NPRM. This definition is consistent with the definition found in the implementing regulations for sections 101–103 of GINA and with which compliance is already required by most health plans. Under this definition, a test to determine whether an individual has a gene variant associated with breast cancer (such as the BRCA1 or BRCA2 variant) is a genetic test. Similarly, a test to determine whether an individual has a genetic variant associated with hereditary nonpolyposis colorectal cancer is a genetic test. Such tests are genetic in nature because they detect genotypes, mutations, or chromosomal changes. In contrast, medical tests that do not detect genotypes, mutations, or chromosomal changes, are not genetic tests. For example, HIV tests, complete blood counts, cholesterol tests, liver function tests, or tests for the presence of alcohol or drugs are not genetic tests. Consistent with the approach taken generally with the HIPAA Privacy Rule, the Department declines to include these examples in the regulatory text. The Department intends to issue future guidance on its web site about this issue. d. Definition of ‘‘Genetic Services’’ Proposed Rule GINA provides that the term ‘‘genetic information’’ includes, with respect to any individual, any request for, or receipt of, genetic services, or participation in clinical research which includes genetic services, by such individual or any family member of such individual. Section 102(a)(4) of GINA defines ‘‘genetic services’’ to mean: (1) A genetic test; (2) genetic counseling (including obtaining, interpreting, or assessing genetic information); or (3) genetic education. Thus, the fact that an individual or a family member of the individual requested or received a genetic test, counseling, or education is information protected under GINA. Genetic counseling and education are means by which individuals can obtain information and support about potential risks for genetic diseases and disorders. The Department proposed to add the statutory definition of ‘‘genetic services’’ to the Privacy Rule. Overview of Public Comments The Department received one comment requesting that the E:\FR\FM\25JAR2.SGM 25JAR2 Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations Department add language to the definition to make clear that the genetic tests, genetic counseling, or genetic education of a family member of an individual are specifically covered by the term. Final Rule The final rule adopts without modification the definition of ‘‘genetic services’’ proposed in the NPRM. This definition is consistent with the definition found in the implementing regulations for sections 101–103 of GINA and with which compliance is already required by most health plans. The Department does not believe it necessary to add the term ‘‘family member’’ to the definition of ‘‘genetic services’’ because the definition of ‘‘genetic information’’ makes clear that information about any request for, or receipt of, genetic services by a family member of an individual is protected information. e. Definition of ‘‘Family Member’’ sroberts on DSK5SPTVN1PROD with Proposed Rule The term ‘‘family member’’ is used in the definition of ‘‘genetic information’’ in GINA to indicate that an individual’s genetic information also includes information about the genetic tests of the individual’s family members, as well as family medical history. Section 105 of GINA states that the term ‘‘family member’’ shall have the meaning given such term in section 2791 of the PHSA (42 U.S.C. 300gg–91), as amended by GINA section 102(a)(4), which defines ‘‘family member’’ to mean, with respect to any individual: (1) A dependent (as such term is used for purposes of section 2701(f)(2) of the PHSA, 42 U.S.C. 300gg(f)(2)) of such individual; or (2) any other individual who is a firstdegree, second-degree, third-degree, or fourth-degree relative of such individual or of a dependent of the individual. Section 2701(f)(2) of the PHSA uses the term ‘‘dependent’’ to mean an individual who is or may become eligible for coverage under the terms of a group health plan because of a relationship to the plan participant. The Department proposed to incorporate GINA’s definition of ‘‘family member’’ into the Privacy Rule. The proposed rule also clarified within the definition that relatives by affinity (such as by marriage or adoption) are to be treated the same as relatives by consanguinity (that is, relatives who share a common biological ancestor) and that, in determining the degree of relationship, relatives by less than full consanguinity (such as half-siblings, who share only one parent) are treated VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 the same as relatives by full consanguinity (such as siblings who share both parents). The NPRM explained that this broad interpretation of ‘‘family member’’ was consistent with GINA’s legislative history, which suggests that the term ‘‘family member’’ is to be broadly construed to provide the maximum protection against discrimination.18 In addition, the Department proposed to include in the definition of ‘‘family member’’ nonexhaustive lists of persons who are first-, second-, third-, or fourth-degree relatives. Finally, within the definition of ‘‘family member,’’ the Department proposed to refer to the definition of ‘‘dependent’’ contained in the implementing regulations at 45 CFR 144.103 rather to the PHSA directly. Overview of Public Comments One commenter expressed support for including relatives by affinity and by less than full consanguinity, agreeing that this interpretation is consistent with Congressional intent and provides the most privacy protection for individuals. This commenter also was supportive of including non-exhaustive lists of persons who are first-, second-, third-, and fourth-degree relatives to add clarity to the definition. Final Rule As we received only support with regard to the definition of ‘‘family member,’’ the final rule adopts without modification the definition of ‘‘family member’’ proposed in the NPRM. This definition also is consistent with the definition found in the implementing regulations for sections 101–103 of GINA and with which compliance is already required by most health plans. f. Definition of ‘‘Manifestation or Manifested’’ Proposed Rule Although not separately defined by GINA, the terms ‘‘manifestation’’ or ‘‘manifested’’ are used in GINA in three important contexts. First, GINA uses the term ‘‘manifestation’’ to incorporate ‘‘family medical history’’ into the definition of ‘‘genetic information’’ by stating that ‘‘genetic information’’ includes, with respect to an individual, the manifestation of a disease or disorder in family members of such individual. Second, GINA uses the term ‘‘manifested’’ to exclude from the definition of ‘‘genetic test’’ those tests that analyze a physical malady rather than genetic makeup by excluding from the definition analyses of proteins or metabolites that are directly related to a 18 See PO 00000 House Report 110–28, Part 2 at 27. Frm 00099 Fmt 4701 Sfmt 4700 5663 manifested disease, disorder, or pathological condition. Third, GINA uses the term ‘‘manifestation’’ to clarify that nothing in Title I of GINA should be construed to limit the ability of a health plan to adjust premiums or contribution amounts for a group health plan based on the manifestation of a disease or disorder of an individual enrolled in the plan.19 However, GINA provides that, in such case, the manifestation of a disease or disorder in one individual cannot also be used as genetic information about other group members and to further increase the premium for the plan. Similarly, for the individual health insurance market, GINA clarifies that it does not prohibit a health plan from establishing rules for eligibility for an individual to enroll in coverage or from adjusting premium or contribution amounts for an individual based on the manifestation of a disease or disorder in that individual or in a family member of such individual where such family member is covered under the individual’s policy. However, under GINA, the manifestation of a disease or disorder in one individual cannot also be used as genetic information about other individuals and to further increase premiums or contribution amounts. Given the importance of the term ‘‘manifested’’ or ‘‘manifestation,’’ the Department proposed to define the term. Although GINA does not define the term, it is clear from the statutory definition of ‘‘genetic test’’ that a manifested disease or disorder is one ‘‘that could reasonably be detected by a health care professional with appropriate training and expertise in the field of medicine involved.’’ Accordingly, the proposed rule defined the term ‘‘manifestation or manifested’’ to mean, with respect to a disease, disorder, or pathological condition, that an individual has been or could reasonably be diagnosed with the disease, disorder, or pathological condition by a health care professional with appropriate training and expertise in the field of medicine involved. The proposed definition also provided that a disease, disorder, or pathological condition is not manifested if the diagnosis is based principally on genetic information. This clarification was included due to the fact that variants of genes associated with diseases have varying degrees of predictive power for 19 We note that the Affordable Care Act, enacted on March 23, 2010, includes a provision effective for plan years beginning on or after January 1, 2014, that prohibits insurers from discriminating against individuals or charging individuals higher rates based on pre-existing conditions. See Public Law 111–148. E:\FR\FM\25JAR2.SGM 25JAR2 5664 Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations later development of the disease. In some cases, an individual may have a genetic variant for a disease and yet never develop the disease. In other cases, the presence of a genetic variant indicates that the individual will eventually develop the disease, such as is the case with Huntington’s disease. However, an individual may obtain a positive test that shows the genetic variant for Huntington’s disease decades before any clinical symptoms appear. Under the proposed definition, the presence of a genetic variant alone would not constitute the diagnosis of a disease even in cases where it is certain the individual possessing the genetic variant will eventually develop the disease, such as with Huntington’s disease. sroberts on DSK5SPTVN1PROD with Overview of Public Comments A few commenters expressed support for adopting the proposed definition of ‘‘manifestation or manifested’’ because it would provide clarity to the rule and the scope of the underwriting prohibition. One commenter requested that the Department include the examples provided in the preamble to the proposed rule directly within the regulatory definition. A few commenters raised concerns about the inclusion in the proposed definition of the clarification that ‘‘a disease, disorder, or pathological condition is not manifested if the diagnosis is based principally on genetic information.’’ It was argued that the proposed definition was too narrow because, for some diseases, disorders, or pathological conditions, a genetic test is the primary means of diagnosing the condition and further that genetic tests will more frequently be used to diagnose diseases or conditions in the future given the continuing evolution of genetics. It was also argued that the proposed definition went beyond GINA by indicating how a manifested disease or disorder is diagnosed. Final Rule The final rule adopts without modification the definition of ‘‘manifestation or manifested’’ proposed in the NPRM. The definition is consistent with the definition of ‘‘manifestation or manifested’’ found in the implementing regulations for the non-discrimination provisions of sections 101–103 of GINA and with which compliance is already required for most health plans. In developing this definition, the agencies consulted with technical experts at the National Human Genome Research Institute within the National Institutes of Health (NIH). In addition, for the reasons stated above regarding the varying degrees of VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 predictive power genes provide in terms of ultimate development of a disease, as well as of the fact that a genetic test for a disease may precede clinical signs or symptoms by years or even decades, the Department does not believe that the definition is too narrow but rather that it is consistent with the provisions of GINA that protect genetic information from being used for health coverage determinations. Finally, the definition does not preclude a health care provider from performing one or more genetic tests to confirm a diagnosis so long as the diagnosis is not based solely or principally on the result of the genetic test. To illustrate the definition, we provide the following examples, which were also included in the NPRM: • An individual may have a family member that has been diagnosed with Huntington’s disease and also have a genetic test result that indicates the presence of the Huntington’s disease gene variant in the individual. However, when the individual is examined by a neurologist (a physician with appropriate training and expertise for diagnosing Huntington’s disease) because the individual has begun to suffer from occasional moodiness and disorientation (symptoms which are associated with Huntington’s disease), and the results of the examination do not support a diagnosis of Huntington’s disease, then Huntington’s disease is not manifested with respect to the individual. In contrast, if the individual exhibits additional neurological and behavioral symptoms, and the results of the examination support a diagnosis of Huntington’s disease by the neurologist, then Huntington’s disease is manifested with respect to the individual. • An individual has had several family members with colon cancer, one of whom underwent genetic testing which detected a mutation in the MSH2 gene associated with hereditary nonpolyposis colorectal cancer (HNPCC). On the recommendation of his physician (a health care professional with appropriate training and expertise in the field of medicine involved), the individual undergoes a targeted genetic test to look for the specific mutation found in the family member of the individual to determine if the individual himself is at increased risk for cancer. The genetic test shows that the individual also carries the mutation but the individual’s colonoscopy indicates no signs of disease and the individual has no symptoms. Because the individual has no signs or symptoms of colorectal cancer that could be used by the individual’s physician to diagnose the cancer, HNPCC is not a PO 00000 Frm 00100 Fmt 4701 Sfmt 4700 manifested disease with respect to the individual. In contrast, if the individual undergoes a colonoscopy or other medical tests that indicate the presence of HNPCC, and the individual’s physician makes a diagnosis of HNPCC, HNPCC is a manifested disease with respect to the individual. • If a health care professional with appropriate expertise makes a diagnosis based on the symptoms of the patient, and uses genetic tests to confirm the diagnosis, the disease will be considered manifested, despite the use of genetic information. For example, if a neurologist sees a patient with uncontrolled movements, a loss of intellectual faculties, and emotional disturbances, and the neurologist suspects the presence of Huntington’s disease, the neurologist may confirm the diagnosis with a genetic test. While genetic information is used as part of the diagnosis, the genetic information is not the sole or principal basis for the diagnosis, and, therefore, the Huntington’s disease would be considered a manifested disease of the patient. As with the definition of ‘‘genetic test,’’ the Department declines to include these examples in the regulatory text as this is inconsistent with the approach generally taken in the HIPAA Privacy Rule. The Department intends to issue future guidance on its web site with respect to the Rule’s protections for genetic information. g. Definition of ‘‘Health Plan’’ Proposed Rule The Department proposed to make technical corrections to update the definition of ‘‘health plan’’ by revising and renumbering the definition to: Include specific reference to the Voluntary Prescription Drug Benefit Program under Part D of title XVIII of the Social Security Act, 42 U.S.C. 1395w–101 through 1395w–152; remove the specific reference to the Civilian Health and Medical Program of the Uniformed Services (CHAMPUS) (as defined in 10 U.S.C. 1072(4)), as this program is now part of the TRICARE health care program under title 10 of the United States Code, and revise the reference to the title 10 health care program accordingly to read more generally ‘‘health care program for the uniformed services’’ rather than ‘‘health care program for active military personnel’’; and reflect that Part C of title XVIII of the Social Security Act, 42 U.S.C. 1395w–21 through 1395w–28, is now called the Medicare Advantage program. E:\FR\FM\25JAR2.SGM 25JAR2 Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations Overview of Public Comments The Department did not receive any comments on the proposed technical corrections to the definition of ‘‘health plan.’’ Final Rule The final rule incorporates the technical corrections to the definition. 4. Section 164.501—Definitions The Department proposed to modify § 164.501 to add a definition of ‘‘underwriting purposes’’ and to make conforming changes to the definitions of ‘‘payment’’ and ‘‘health care operations.’’ sroberts on DSK5SPTVN1PROD with a. Definition of ‘‘Underwriting Purposes’’ Proposed Rule Section 105 of GINA provides that the term ‘‘underwriting purposes’’ means, with respect to a group health plan, health insurance coverage, or Medicare supplemental policy: (A) Rules for, or determination of, eligibility (including enrollment and continued eligibility) for, or determination of, benefits under the plan, coverage, or policy; (B) the computation of premium or contribution amounts under the plan, coverage, or policy; (C) the application of any pre-existing condition exclusion under the plan, coverage, or policy; and (D) other activities related to the creation, renewal, or replacement of a contract of health insurance or health benefits. The Department proposed to adopt GINA’s statutory definition of ‘‘underwriting purposes’’ in § 164.501 of the Privacy Rule, but also proposed to include certain clarifications for consistency with the regulations promulgated to implement the nondiscrimination provisions in sections 101 through 103 of GINA. In particular, the Department proposed to include a parenthetical to explain that the rules for, or determination of eligibility for, or determination of, benefits under the plan include changes in deductibles or other cost-sharing mechanisms in return for activities such as completing a health risk assessment or participating in a wellness program. The proposed rule also included a parenthetical to make clear that the computation of premium or contribution amounts under the plan, coverage, or policy includes discounts, rebates, payments in kind, or other premium differential mechanisms in return for activities such as completing a health risk assessment or participating in a wellness program. Finally, we proposed a provision within the VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 definition to clarify that ‘‘underwriting purposes’’ does not include determinations of medical appropriateness where an individual seeks a benefit under the plan, coverage, or policy. Overview of Public Comments About ten commenters addressed the proposed definition of ‘‘underwriting purposes.’’ Four commenters generally supported the proposed definition. Other commenters expressed concern with the definition’s inclusion of discounts, rebates, payments in kind, or other premium differential mechanisms in return for activities such as completing a health risk assessment (HRA) or participating in a wellness program. These commenters were concerned that prohibiting the use of genetic information, particularly family health history, for such purposes would have a detrimental impact on wellness and disease management programs. One commenter was concerned that the definition would prohibit dental insurance plans from offering preventive prognostic features to enrollees as part of the plan that test for susceptibility to dental decay and periodontal diseases. Enrollees that test positive would be provided with additional plan benefits as a supplement to the standard benefits to cover more aggressive preventive services. Finally, a few commenters were concerned that the broad definition of ‘‘underwriting purposes’’ would preclude plans from using HRAs and offering wellness programs even if no genetic information is requested or used. For example, one commenter was concerned that the definition would prohibit the use of ‘‘personal habit’’ information, such as information about smoking, or alcohol or drug use. Final Rule The final rule adopts the proposed definition of ‘‘underwriting purposes’’ but moves the definition to within the underwriting prohibition at § 164.502(a)(5)(i). This makes clear that the definition applies only for purposes of the prohibition on a health plan’s use or disclosure of genetic information for underwriting purposes. As discussed more fully below with respect to the definition of ‘‘health care operations,’’ we move the definition of ‘‘underwriting purposes’’ and retain the term ‘‘underwriting’’ within the definition of ‘‘health care operations’’ in response to several public comments expressing concern that the proposed rule would no longer allow health plans to use or disclose any protected health PO 00000 Frm 00101 Fmt 4701 Sfmt 4700 5665 information (i.e., even non-genetic information) for underwriting. The adopted definition is consistent with the definition promulgated in the interim final regulations to implement sections 101–103 of GINA and with which compliance is already required by most health plans. We decline to exclude wellness programs and the use of HRAs from the definition because, as discussed in the interim final regulations issued by DOL, Treasury, and HHS, GINA Title I does not include an exception for wellness programs.20 However, we emphasize that health plans may continue to provide incentives for completing HRAs and participating in wellness programs in manners that do not involve the use or disclosure of genetic information. For example, ‘‘personal habit’’ information about an individual, such as smoking status and alcohol and drug use, is not genetic information and thus, may be used by health plans for underwriting purposes. Further, DOL has issued guidance which makes clear that health plans may continue to collect family health history through the use of HRAs that are not tied to any reward.21 In addition, the definition of ‘‘underwriting purposes’’ includes an exception for determinations of medical appropriateness where an individual seeks a benefit under the plan, coverage, or policy. Thus, to the extent that an individual is seeking a particular benefit under the plan and the health plan needs genetic information to determine the medical appropriateness of providing the benefit to the individual, the plan may use or disclose the minimum necessary genetic information to determine the medical appropriateness of providing the benefit. For example, if a health plan covers yearly mammograms for individuals under age 40 only in cases where the individual can demonstrate she is at increased risk for breast cancer, the plan can ask an individual under age 40 to provide the results of a genetic test or family health history and use such information to determine medical appropriateness prior to paying a claim for the mammogram. The medical appropriateness exception would also cover situations where a dental plan requires the results of a genetic test prior to offering a supplemental benefit for more aggressive preventive services to the extent the individual seeks such a benefit. For example, a dental plan may provide information to all of its enrollees about how to take advantage of 20 See 74 FR 51669, footnote 12. Q14 at https://www.dol.gov/ebsa/faqs/faqGINA.html. 21 See E:\FR\FM\25JAR2.SGM 25JAR2 5666 Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations such a benefit, and when an enrollee contacts the plan about obtaining the benefit, may require the individual to take and provide the results of a genetic test to determine the medical appropriateness of providing the supplemental benefit to the individual. b. Definition of ‘‘Health Care Operations’’ Proposed Rule The definition of ‘‘health care operations’’ at § 164.501 includes at paragraph (3) ‘‘underwriting, premium rating, and other activities relating to the creation, renewal or replacement of a contract of health insurance or benefits * * *.’’ To avoid confusion with the use of both ‘‘underwriting’’ and ‘‘underwriting purposes’’ in the Privacy Rule, and in recognition of the fact that the proposed definition of ‘‘underwriting purposes’’ includes activities that fall within both the definitions of ‘‘payment’’ and ‘‘health care operations’’ in the Rule, the Department proposed to remove the term ‘‘underwriting’’ from the definition of ‘‘health care operations.’’ We also proposed to add the term ‘‘enrollment’’ to the express list of health care operations activities to make clear that the removal of the term ‘‘underwriting’’ would not impact the use or disclosure of protected health information that is not genetic information for enrollment purposes. These proposed revisions were not intended to be substantive changes to the definition and thus, health plans would be permitted to continue to use or disclose protected health information, except genetic information, for underwriting purposes. sroberts on DSK5SPTVN1PROD with Overview of Public Comments The Department received a few comments on the proposed revisions to the definition of ‘‘health care operations.’’ One commenter supported the inclusion of the word ‘‘enrollment.’’ A few commenters, however, expressed concern and confusion that the removal of the term ‘‘underwriting’’ from the definition of ‘‘health care operations’’ would no longer permit uses or disclosures of even non-genetic protected health information for underwriting. Final Rule Due to the confusion and concern expressed by the commenters regarding the removal of the term ‘‘underwriting’’ from the definition, we retain the term ‘‘underwriting’’ within the definition of ‘‘health care operations’’ at § 164.501 However, to make clear that a health plan may continue to use or disclose only protected health information that is VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 not genetic information for underwriting, we include a reference to the prohibition on using or disclosing genetic information for underwriting purposes within the definition. The final rule also retains the term ‘‘enrollment’’ within the definition because we believe it is helpful to clarify that this is a permitted health care operations activity. c. Definition of ‘‘Payment’’ Proposed Rule The definition of ‘‘payment’’ in the Privacy Rule at § 164.501 includes activities, such as ‘‘determinations of eligibility or coverage’’ by a health plan, some of which may fall within the definition of ‘‘underwriting purposes.’’ To avoid any implication that a health plan would be permitted to use or disclose protected health information for ‘‘payment’’ purposes that are otherwise prohibited by the underwriting prohibition, we proposed to include a cross-reference in the definition of ‘‘payment’’ to the prohibition. Further, we believed the inclusion of such a cross-reference to be necessary to properly align the definition of ‘‘payment’’ in the Privacy Rule with the nondiscrimination provisions of GINA Title I and their implementing regulations. GINA provides a rule of construction at section 102(a)(2), which adds paragraph 2702(c)(3) of the PHSA, to make clear that health plans are not prohibited from obtaining and using the results of a genetic test in making determinations regarding payment, as such term is defined by the HIPAA Privacy Rule. Thus, the proposed exception would make clear that GINA’s rule of construction regarding payment does not allow a health plan to use the results of genetic tests for activities that would otherwise constitute ‘‘underwriting purposes,’’ such as for determinations of eligibility for benefits. Overview of Public Comments The Department received two comments on the proposed change to the definition of ‘‘payment,’’ one supporting the change and one indicating it is unnecessary. Final Rule For the reasons described above, the final rule adopts the proposed change to the definition of ‘‘payment.’’ PO 00000 Frm 00102 Fmt 4701 Sfmt 4700 5. Section 164.502(a)—Uses and Disclosures of Protected Health Information: General Rules a. Prohibition Proposed Rule To implement section 105 of GINA, the Department proposed a new prohibition on health plans using or disclosing protected health information that is genetic information for underwriting purposes at § 164.502(a)(3). We made clear that such a provision would operate notwithstanding the other provisions in the Privacy Rule permitting uses and disclosures, and proposed a conforming change to § 164.502(a)(1)(iv) to clarify further that an authorization could not be used to permit a use or disclosure of genetic information for underwriting purposes. Overview of Public Comments Some commenters expressly supported the proposed modification to the Privacy Rule to include the prohibition, and the proposed clarification that an authorization cannot be used to otherwise permit a prohibited use or disclosure of genetic information. One commenter suggested adding the examples from the preamble to the regulatory text, as well as language to the regulatory text to clarify that the prohibition applies to genetic information obtained by a health plan prior to the passage of GINA. Final Rule The final rule adopts the proposed prohibition on a health plan’s use or disclosure of genetic information for underwriting purposes, except with regard to health plans that are issuers of long term care policies, as explained above in section VI.C.1 regarding to which plans the final rule applies. This prohibition, located in this final rule at § 164.502(a)(5), applies to all genetic information from the compliance date of these modifications forward, regardless of when or where the genetic information originated. We do not believe a clarification of this fact in the regulatory text is necessary. Consistent with Sec. 101(a) of the statute, this prohibition should not be construed to limit the ability of a health plan to adjust premiums or contribution amounts for a group health plan based on the manifestation of a disease or disorder of an individual enrolled in the plan, even though a health plan cannot use the manifestation of a disease or disorder in one individual as genetic information about other group members and to further increase the premium for the plan. Similarly, for the individual E:\FR\FM\25JAR2.SGM 25JAR2 Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations health insurance market, a health plan is not prohibited from establishing rules for eligibility for an individual to enroll in coverage or from adjusting premium or contribution amounts for an individual based on the manifestation of a disease or disorder in that individual or in a family member of such individual where such family member is covered under the individual’s policy, even though the health plan cannot use the manifestation of a disease or disorder in one individual as genetic information about other individuals to further increase premiums or contribution amounts for those other individuals. To illustrate how the prohibition operates, we reiterate the following examples (but for the reasons explained above, decline to include them in the regulatory text). If a health insurance issuer, with respect to an employersponsored group health plan, uses an individual’s family medical history or the results of genetic tests maintained in the group health plan’s claims experience information to adjust the plan’s blended, aggregate premium rate for the upcoming year, the issuer would be using protected health information that is genetic information for underwriting purposes in violation of § 164.502(a)(5)(i). Similarly, if a group health plan uses family medical history provided by an individual incidental to the collection of other information on a health risk assessment to grant a premium reduction to the individual, the group health plan would be using genetic information for underwriting purposes in violation of § 164.502(a)(5)(i). The prohibition is limited to health plans. A health care provider may use or disclose genetic information as it sees fit for treatment of an individual. If a covered entity, such as an HMO, acts as both a health plan and health care provider, it may use genetic information for purposes of treatment, to determine the medical appropriateness of a benefit, and as otherwise permitted by the Privacy Rule, but may not use such genetic information for underwriting purposes. Such covered entities, in particular, should ensure that appropriate staff members are trained on the permissible and impermissible uses of genetic information. sroberts on DSK5SPTVN1PROD with 6. Section 164.504(f)(1)(ii)— Requirements for Group Health Plans Proposed Rule Section 164.504(f)(1)(ii) permits a group health plan, or health insurance issuer or HMO with respect to the group health plan, to disclose summary health VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 information to the plan sponsor if the plan sponsor requests the information for the purpose of obtaining premium bids from health plans for providing health insurance coverage under the group health plan, or for modifying, amending, or terminating the group health plan. As this provision permits activities that constitute ‘‘underwriting purposes,’’ as defined by GINA and the proposed rule, the Department proposed to modify § 164.504(f)(1)(ii) to clarify that § 164.504(f)(1)(ii) would not allow a disclosure of protected health information that is otherwise prohibited by the underwriting prohibition. Overview of Public Comments The Department received one comment in support of this modification. Final Rule The final rule adopts the modification to § 164.504(f)(1)(ii). 7. Section 164.506—Uses and Disclosures To Carry Out Treatment, Payment, or Health Care Operations Proposed Rule Section 164.506(a) of the Privacy Rule sets out the uses and disclosures a covered entity is permitted to make to carry out treatment, payment, or health care operations. In light of the fact that the proposed definition of ‘‘underwriting purposes’’ encompasses activities that fall both within the definitions of ‘‘payment’’ and ‘‘health care operations’’ under the Privacy Rule, the Department proposed to add a crossreference in § 164.506(a) to the new underwriting prohibition to make clear that § 164.506 of the Privacy Rule would not permit health plans to use or disclose an individual’s protected health information that is genetic information for underwriting, even though such a use or disclosure is considered payment or health care operations. 5667 protected health information for underwriting, premium rating, or other activities relating to the creation, renewal, or replacement of a contract for health insurance or health benefits, from using or disclosing such protected health information for any other purpose (except as required by law) if the health insurance or health benefits are not placed with the health plan. The Department proposed conforming amendments to § 164.514(g) to: (1) Remove the term ‘‘underwriting’’ to avoid confusion given the new definition of ‘‘underwriting purposes,’’ which encompasses the activities described above; and (2) make clear that a health plan that receives protected health information that is genetic information for the above purposes is not permitted to use or disclose such information for underwriting purposes. The proposed removal of the term ‘‘underwriting’’ from § 164.514(g) was not intended as a substantive change to the scope of the provision. Overview of Public Comments One commenter suggested that the Department reconsider the removal of the term ‘‘underwriting’’ from this section as it could be viewed as a substantive change to the scope of the provision, and expressed concern that the modification would prohibit a health plan from using or disclosing genetic information as required by other law. Overview of Public Comments The Department received one comment in support of this modification. Final Rule The final rule modifies § 164.514(g) to refer to the prohibition, now at § 164.502(a)(5). However, as with the definition of ‘‘health care operations,’’ we do not remove the term ‘‘underwriting’’ to avoid unnecessary confusion. We also clarify that a health plan may continue to use or disclose protected health information that is genetic information as required by other law, except to the extent doing so would be inconsistent with the prohibition in GINA and this final rule at § 164.502(a)(5)(i) against using or disclosing genetic information for underwriting purposes. Final Rule The final rule adopts the modification to § 164.506(a). 9. Section 164.520—Notice of Privacy Practices for Protected Health Information 8. Section 164.514(g)—Uses and Disclosures for Activities Relating to the Creation, Renewal, or Replacement of a Contract of Health Insurance or Health Benefits Proposed Rule Section 164.514(g) of the Privacy Rule prohibits a health plan that receives PO 00000 Frm 00103 Fmt 4701 Sfmt 4700 Proposed Rule As discussed above in Section IV with regard to the changes made to § 164.520 pursuant to the HITECH Act, § 164.520 of the Privacy Rule sets out the requirements for most covered entities to have and distribute a Notice of Privacy Practices (NPP). With respect to the NPP, the Department believes that E:\FR\FM\25JAR2.SGM 25JAR2 5668 Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations sroberts on DSK5SPTVN1PROD with individuals should be informed of their new rights and protections under this rule with respect to genetic information in the health coverage context. Thus, the Department proposed in § 164.520(b)(1)(iii)(D) to require health plans that use or disclose protected health information for underwriting to include a statement in their NPP that they are prohibited from using or disclosing protected health information that is genetic information about an individual for such purposes. Without such a specific statement, individuals would not be aware of this restriction and the general statements regarding permitted uses and disclosures for treatment, payment, and health care operations in the NPP of a health plan that performs underwriting would not be accurate (i.e., the NPP would state that the health plan may use or disclose PHI for purposes of payment and health care operations, which would not be true with respect to genetic information when the use or disclosure is for underwriting purposes). The preamble explained that the proposed prohibition on using or disclosing genetic information for underwriting and the proposed requirement to explicitly include a statement regarding the prohibition would represent a material change to the NPP of health plans that perform underwriting, and the Privacy Rule requires at § 164.520(c)(1)(i)(C) that plans provide notice to individuals covered by the plan within 60 days of any material revision to the NPP. As in the NPRM issued to implement HITECH Act provisions, the Department requested comment on ways to inform individuals of this change to privacy practices without unduly burdening health plans and provided several possible alternatives. The Department also explained that the obligation to revise the NPP for the reasons described above would fall only on health plans that intend to use or disclose protected health information for activities that constitute ‘‘underwriting purposes.’’ Thus, health care providers, as well as health plans that do not perform underwriting, would not be required to revise their NPPs. Overview of Public Comments One commenter supported informing individuals in the NPP that health plans are prohibited from using or disclosing genetic information for underwriting purposes. One commenter asked the Department to clarify that where a health plan has already made a change to the NPP to comply with a statute, such as with GINA, and has sent the revised NPP to members, the health VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 plan would not be required to make another change to its NPP to comply with the regulation. A number of comments addressed the issue of the timing and manner of distributing revised NPPs. In general, commenters recommended various alternatives, including: (1) Require health plans to provide a revised NPP to members in the next annual mailing; (2) require health plans to provide either a revised NPP or a supplement to members in the next annual mailing and to post the revised NPP or supplement on the health plan Web site immediately; (3) retain the existing 60day deadline for providing a revised NPP to individuals or provide for a 30day extension; and (4) allow for distribution via electronic processes for more efficient delivery of NPPs to members. Final Rule The final rule adopts the requirement for health plans that perform underwriting to include in their NPPs a statement that they are prohibited from using or disclosing genetic information for such purposes, except with regard to issuers of long term care policies, which are not subject to the underwriting prohibition. Health plans that have already modified and redistributed their NPPs to reflect the statutory prohibition are not required to do so again, provided the changes to the NPP are consistent with this rule. We also modify the NPP distribution requirements for health plans where there are material changes. These modifications are discussed above in Section IV with regard to material changes to the NPP resulting from changes pursuant to the HITECH Act. 10. Other Comments Comment: One commenter requested clarification on preemption with regard to the new underwriting prohibition. Response: Pursuant to subpart B of Part 160 of the HIPAA Administrative Simplification Rules, to the extent that a provision of State law requires a use or disclosure of genetic information for an activity that would otherwise constitute ‘‘underwriting purposes,’’ such State law would be preempted by the Privacy Rule unless an exception at § 160.203 applies. In contrast, State laws that provide greater privacy protection for genetic information than the Privacy Rule continue to remain in place. Comment: One commenter asked how a health care provider should ensure that releasing an individual’s information to a health plan will not result in an inappropriate disclosure to the health plan for underwriting PO 00000 Frm 00104 Fmt 4701 Sfmt 4700 purposes. This commenter also asked what the rules are for access to protected health information about an individual by the individual’s extended family members seeking to determine if they are affected by a genetic trait. Response: With respect to the first question, these rules do not apply to health care providers. A covered health provider may continue to disclose protected health information, including genetic information, where doing so meets the minimum necessary standard, to health plans for payment purposes. Under this Rule, the onus is on the health plan to not use or disclose protected health information it receives for such purposes for prohibited underwriting purposes. Further, health plans continue to be required by the Privacy Rule to limit requests of protected health information to the minimum necessary when requesting such information from other covered entities. The regulations implementing sections 101–103 of GINA also restrict the ability of health plans covered by those rules to request genetic information. With respect to the second question, to the extent that an individual’s genetic information is needed for the treatment purposes of a family member, a covered health care provider is permitted to disclose such information, subject to any agreed-upon restriction, to another provider for the treatment of the family member. See FAQ #512 at https:// www.hhs.gov/ocr/privacy/hipaa/faq/ right_to_request_a_restriction/512.html, which makes clear that a health care provider may share genetic information about an individual with providers treating family members of the individual who are seeking to identify their own genetic health risks, provided the individual has not requested and the health care provider has not agreed to a restriction on such disclosure. Comment: One commenter requested that the rule require that health plans conducting or sponsoring research involving genetic information provide research participants with an explicit statement to ensure the individuals understand that such information may not and will not be used for underwriting purposes. Response: We decline to require such a statement. The regulations implementing sections 101–103 of GINA already require a statement to that effect as a condition of the health plan requesting that a research participant undergo a genetic test as part of the research. See, e.g., 45 CFR 144.122(c)(5). Further, this rule requires that health plans that perform underwriting inform individuals through their NPPs that the E:\FR\FM\25JAR2.SGM 25JAR2 Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations plans may not use or disclose genetic information for such purposes. Comment: One commenter asked that the HIPAA de-identification standard be strengthened to provide better protection for health information, including genetic information. Response: The Privacy Rule’s deidentification standard is outside the scope of this rulemaking. VII. Regulatory Analyses A. Introduction We have prepared a regulatory impact statement in compliance with Executive Order 12866 (September 1993, Regulatory Planning and Review), Executive Order 13563 (January 2011, Improving Regulation and Regulatory Review), the Regulatory Flexibility Act (RFA) (September 19, 1980, Pub. L. 96– 354), the Unfunded Mandates Reform Act of 1995 (UMRA) (March 22, 1995, Pub. L. 104–4), and Executive Order 13132 on Federalism. We begin with a discussion of Executive Orders 12866 and 13563 and then present a more detailed analysis of costs and benefits. Finally, relying on information explained in the cost-benefit analysis, we discuss issues related to the RFA, UMRA, and Federalism considerations. sroberts on DSK5SPTVN1PROD with 1. Executive Order 12866 and Executive Order 13563 Executive Orders 12866 and 13563 direct agencies to assess all costs and benefits of available regulatory alternatives and, if regulation is necessary, to select regulatory approaches that maximize net benefits (including potential economic, environmental, public health and safety effects, distributive impacts, and equity). Executive Order 13563 emphasizes the importance of quantifying both costs and benefits, of reducing costs, of harmonizing rules, and of promoting flexibility. A regulatory impact analysis must be prepared for major rules that have economically significant effects ($100 million or more in any one year) or adversely affect in a material way the economy, a sector of the economy, productivity, competition, jobs, the environment, public health or safety, or State, local, or Tribal government or communities (58 FR 51741). Based on the following analysis, this rule has been designated as an economically significant regulatory action within the meaning of section 3(f)(4) of Executive Order 12866. Accordingly, the rule has been reviewed by the Office of Management and Budget. To summarize, we estimate that the rule will result in new first-year costs of VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 between $114 million and $225.4 million. Annualizing the midpoints of our cost estimates at three and seven percent over ten years produces costs of $35.2 million and $42.8 million, respectively.22 We estimate that the effects of the requirement for covered entities (including indirect costs incurred by third party administrators, which frequently send out notices on behalf of health plans) to issue new notices of privacy practices, as a result of the final changes to the HIPAA Privacy Rule under both the HITECH Act and GINA, will result in new costs of $55.9 million within 12 months of the effective date of the final rule. Annualizing the costs over 10 years at 3 percent and 7 percent results in annual NPP costs of approximately $6.6 million and $8 million, respectively. We have revised our cost estimate for NPP revisions since the proposed rule to reflect the increased flexibility provided in the final rule, which allows health plans to include their new NPPs in their usual, annual mailing rather than send them to individuals in a separate mailing. We also note that combining GINA and HITECH requirements into a single rule results in lower costs than would be incurred if covered entities were required to revise their NPPs multiple times to comply with separate rulemakings. Additionally, we have revised the annual estimated cost to comply with the final breach notification provisions. As we discuss below, we acknowledge there may still be some underreporting of breaches, however we do anticipate that the overall number of breaches will decrease in the future. As such, Table 2 below shows the costs of complying with the provisions of the breach notification final rule, which have been revised based on our experience with the number of breach notifications we have received from covered entities during calendar years 2010 and 2011. We estimate the total annual cost for the breach notification rule to be approximately $14.5 million. Annualizing over 10 years at 3% and 7% produces annual breach implementation costs of approximately $17 million and $20.6 million. With regard to the business associate provisions of the final rule, we assume that business associates currently comply with the HIPAA Privacy Rule 22 The breach notification provisions are the rule’s only source of ongoing, annual costs. Therefore, with respect to breach, we annualize costs incurred on an annual basis. For the other provisions, we calculate annualized opportunity costs based on costs expended only in the first year of implementation. PO 00000 Frm 00105 Fmt 4701 Sfmt 4700 5669 use and disclosure provisions as required by their business associate contracts. However, with regard to the Security Rule, while we continue to believe that most business associates have implemented security protections that meet the Security Rule requirements as part of the assurances provided to covered entities through their contracts, we recognize that some smaller or less sophisticated business associates may not have engaged in the formal administrative safeguards required by the HIPAA Security Rule, and may not have written policies and procedures for compliance. For these business associates, we estimate that the costs to come into compliance with the Security Rule will be between approximately $22.6 million and $113 million. Annualizing the midpoint estimate ($67.8 million) at 3 percent and 7 percent produces costs of $7.9 million and $9.7 million, respectively. Although we also continue to believe that most business associates have made a good faith attempt to conform their agreements with subcontractors to HIPAA requirements, we acknowledge the possibility that some business associates may make such efforts for the first time now that they and their subcontractors are subject to direct liability under the Rules. For this fraction of business associates, we estimate that the costs to bring subcontracts into compliance with the business associate agreement requirements will be between $21 million and $42 million. Annualizing the midpoint of those estimates ($31.5 million) at 3 percent and 7 percent results in costs of $3.7 million and $4.5 million, respectively. There may be other costs we are not able to monetize because we lack data, and the rule may produce savings that may offset some or all of the added costs. We discuss these unquantified costs and benefits of the rule at the end of the Regulatory Impact Analysis. As a result of the economic impact, and other costs that are described but not quantified in the regulatory analysis below, OMB has determined that this rule is an economically significant regulatory action within the meaning of section 3(f)(4) of Executive Order 12866. We present our analysis of the costs and benefits of the rule in sections C and D below. 2. Entities Subject to the Rule This rule impacts covered health care providers, health insurance issuers, and third party administrators acting on behalf of health plans, which we estimate to total 698,238 entities. The rule also applies to approximately 1–2 E:\FR\FM\25JAR2.SGM 25JAR2 5670 Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations million business associates and an unknown number of subcontractors.23 Table 1 below shows the number of covered entities by class of provider and insurer that will be affected by the Rule. TABLE 1—NUMBER OF COVERED ENTITIES BY NAICS CODE 24 Number of entities NAICS Providers/suppliers 622 ................................................................................... Hospitals (General Medical and Surgical, Psychiatric, Substance Abuse, Other Specialty). Nursing Facilities (Nursing Care Facilities, Residential Mental Retardation Facilities, Residential Mental Health and Substance Abuse Facilities, Community Care Facilities for the Elderly, Continuing Care Retirement Communities). Office of MDs, DOs, Mental Health Practitioners, Dentists, PT, OT, ST, Audiologists. Outpatient Care Centers (Family Planning Centers, Outpatient Mental Health and Drug Abuse Centers, Other Outpatient Health Centers, HMO Medical Centers, Kidney Dialysis Centers, Freestanding Ambulatory Surgical and Emergency Centers, All Other Outpatient Care Centers). Medical Diagnostic, and Imaging Service Covered Entities. Home Health Service Covered Entities ............ Other Ambulatory Care Service Covered Entities (Ambulance and Other). Durable Medical Equipment Suppliers 26 .......... Pharmacies 27 ................................................... Health Insurance Carriers 28 ............................. Third Party Administrators Working on Behalf of Covered Health Plans 29. 623 ................................................................................... 6211–6213 ....................................................................... 6214 ................................................................................. 6215 ................................................................................. 6216 ................................................................................. 6219 ................................................................................. N/A ................................................................................... 4611 ................................................................................. 524114 ............................................................................. 524292 ............................................................................. Total Entities ............................................................. B. Why is this rule needed? sroberts on DSK5SPTVN1PROD with This final rule is needed to strengthen and expand the privacy and security protections for individuals’ health information and privacy rights established under the HIPAA, as mandated by the HITECH Act and GINA. These enhancements are necessary to ensure continued adequate protections for health information, as well as trust in the health care system, particularly as the adoption and use of electronic health records increases. Importantly, among other changes, the rule makes business associates of covered entities directly liable for Federal penalties for failures to comply with certain provisions of the rule. This expansion in liability closes a large gap in protection that existed prior to these 23 Although we do not have data on the numbers of business associates, our enforcement experience leads us to believe that each covered entity has, on average, two to three business associates, for a total of 1–2 million business associates. This number likely overestimates the number of business associates, as some entities may be business associates to multiple covered entities. We do not VerDate Mar<15>2010 20:19 Jan 24, 2013 Jkt 229001 ........................................................................... Estimated number of small entities 25 4,060 4,060 34,400 34,400 419,286 419,286 13,962 13,962 7,879 7,879 15,329 5,879 15,329 5,879 107,567 88,396 730 750 107,567 88,396 276 750 698,238 697,784 modifications with respect to business associates, which are the cause of many of the security breaches for which the Department receives breach reports. The final rule also lays out standards for when individuals and the Secretary must be informed that a breach of protected health information has occurred so that individuals may take measures to protect themselves from risks associated with the breach. By establishing requirements for notifying individuals and making business associates directly liable for complying with certain provisions of the Privacy and Security rules, we expect the number of breaches of protected health information to decline over time. This final rule also makes changes to the HIPAA rules, such as those that streamline the research authorization process, that are designed to increase flexibility for, and decrease burden on, the regulated entities, as well as to harmonize certain requirements with those under the Department’s Human Subjects Protections regulations. have a basis for estimating the number of subcontractors that will be subject to the rule. 24 Office of Advocacy, SBA, https://www.sba.gov/ advo/research/data.html. 25 Because the vast majority of covered providers are small entities, we include all providers in our estimates of small providers. 26 Centers for Medicare & Medicaid Services covered entities. 27 The Chain Pharmacy Industry https:// www.nacds.org/wmspage.cfm?parm1=507. 28 Source: HHS ASPE analysis of 2010 NAIC Supplemental Health Care Exhibit data. 29 We include third party administrators in our count of covered entities, although they are business associates, because the nature of their representation of the majority of ERISA plans makes them an appropriate ‘‘surrogate’’ for those plans. PO 00000 Frm 00106 Fmt 4701 Sfmt 4700 C. Costs 1. Breach Notification Costs The preamble to the interim final rule published on August 24, 2009, contained a regulatory impact statement estimating the economic burden of implementing the rule. We are revising that impact statement in this final rule based upon our experience with collecting breach notifications from covered entities during calendar years 2010 and 2011. The analysis that follows is very similar to the analysis set forth in the preamble to the interim final rule; however, instead of using information E:\FR\FM\25JAR2.SGM 25JAR2 Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations from https://www.datalossdb.org to estimate the number of breaches that would occur each year, we have used the breach notifications provided to the Secretary during calendar years 2010 and 2011 to project the ongoing, annual costs to covered entities for implementing the breach notification provisions. Several commenters noted that significantly more breaches would occur each year than the interim final rule anticipated, and we acknowledge that the estimates provided in the interim final rule were significantly lower than our experience has been to date. As such, we believe that relying on our experience receiving notifications addresses the concerns of the commenters who thought we were underestimating the number of breaches that would occur each year. Based upon this information, we have revised the projected annual cost to implement these breach notification provisions. We acknowledge that there may still be some underreporting of breaches as the obligations of the regulation may not yet have penetrated down to all covered entities and business associates. At the same time, we expect that some types of incidents being reported today may not in the future as covered entities and business associates become more familiar with the definition of breach and more adept at performing risk assessments and determining whether a breach has occurred. We have received breach notifications from covered entities in several situations in which notification was not necessary, such as where there was no underlying impermissible use or disclosure under the Privacy Rule or where one of the exceptions to breach clearly applied to the situation. This is the type of overreporting that we expect to diminish in the future. Additionally, covered entities and business associates are 5671 beginning to recognize areas of potential weakness and to take systemic actions to prevent breaches from occurring in the future, such as encrypting portable devices to avoid having to provide breach notifications in the event the device is lost or stolen. Table 2 shows the costs of the provisions of the final rule based on the breach notifications we have received from covered entities during calendar years 2010 and 2011. We also present the costs required for investigating breaches and the amount of time we anticipate individuals will spend calling the toll-free number for substitute notice. We estimate the total cost for the breach notification rule to be approximately $14.5 million. Discounting at 3 percent and 7 percent and annualizing over 10 years results in costs of $17 million and $20.6 million, respectively. TABLE 2—SUMMARY OF ANNUAL COMPLIANCE COST FOR BREACH NOTIFICATION IN 2011 DOLLARS Number of affected individuals Number of breaches Cost elements Cost/breach Cost/affected individuals Cost E-mail and 1st Class Mail .................................................... Substitute Notices: Media Notice ......................................... Substitute Notices: Toll-Free Number ................................. Imputed cost to affected individuals who call the toll-free line .................................................................................... Notice to Media of Breach: Over 500 .................................. Report to the Secretary: 500 or More ................................. Investigation Costs: Under 500 ........................................... Investigation Costs: 500 or More ......................................... Annual Report to the Secretary: Under 500 ........................ 19,000 1,190 1,190 6,710,000 6,605,500 30 660,550 $182 480 1,526 $0.517 0.086 2.750 $3,467,122 571,200 1,816,379 1,190 250 250 18,750 250 18,750 660,550 6,600,000 6,600,000 324,050 6,600,000 110,000 1,725 62 62 281 3,350 23 3.108 0.002 0.002 16.29 0.127 3.84 2,052,665 15,420 15,420 5,277,456 837,500 422,438 Total Cost ..................................................................... ........................ ........................ ........................ ........................ 14,475,600 30 As we explain below in the section on substitute notice, we project that 6,605,500 individuals will be affected by breaches that may require substitute notice, but we expect that at most 10% of affected individuals will call the toll-free line for information. sroberts on DSK5SPTVN1PROD with In this revised analysis, we rely entirely on our experience with breach notifications received by the Secretary during calendar years 2010 and 2011, for projecting the ongoing, annual costs of the breach notification rule. Based on our experience in those years, we project the likely number of breaches, number of affected individuals, and costs associated with this regulation. We have not attempted to predict future costs because, as discussed above, while we anticipate the overall number of breaches and the overall costs of implementing the breach notification provisions to fall over time, we do not currently have enough data to establish such a trend. Affected Entities The entities affected by the breach notification regulation are outlined in the impact statement of the interim final VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 rule. HIPAA covered entities and their business associates must comply with these regulations. We estimate that approximately 700,000 HIPAA covered entities will be subject to the final rule, although many fewer will experience a breach requiring them to fulfill the breach notification requirements. How many breaches will require notification? Although this final rule modifies the definition of breach at § 164.402 to remove the harm standard, we do not believe that this will have a significant effect on the number of breaches reported to HHS or on the number of individuals affected. As discussed in Section V above, this final rule removes the harm standard and implements a more objective risk assessment for evaluating whether an impermissible use or disclosure is a breach. As a result, PO 00000 Frm 00107 Fmt 4701 Sfmt 4700 covered entities must still perform a risk assessment following an impermissible use or disclosure of protected health information to determine the probability that the protected health information has been compromised. Events such as hacking into an unencrypted database and theft of unsecured protected health information would in almost all cases constitute a breach in this final rule, just as they would under the interim final rule’s definition of breach. However, given the further clarity in this rule as to the standard and factors to be considered, other incidents that may not have been considered a breach under the interim final rule may be considered a breach under this final rule (or in some cases, vice versa). Instead of relying on data from https://www.datalossdb.org to estimate the number of breaches and the number of individuals affected by such breaches E:\FR\FM\25JAR2.SGM 25JAR2 sroberts on DSK5SPTVN1PROD with 5672 Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations each year, this final rule uses breach notification reports submitted to the Secretary by covered entities to revise our previous estimates. We believe these reports provide us with much more complete information from which to project the overall cost of implementing this regulation. Beginning September 23, 2009, covered entities were obligated to notify the Secretary of all breaches of protected health information occurring on or after that date. As of September 23, 2009, covered entities must report breaches affecting 500 or more individuals to the Secretary without unreasonable delay and in no case later than 60 days from discovery of the breach, while breaches affecting fewer individuals must be reported to the Secretary within 60 days of the end of the calendar year in which the breach occurred. Based on our experience receiving breach notifications during calendar years 2010 and 2011, we project that HHS will receive approximately 19,000 breach notifications from covered entities annually or, on average, approximately 1,583 breach notifications each month. Approximately 250 such notifications will report breaches affecting 500 or more individuals and the remaining 18,750 reported breaches will affect fewer than 500 individuals. We project that approximately 6.71 million individuals will be affected by the 19,000 breaches reported to HHS each year, which is, on average, roughly 353 affected individuals per breach. As in the interim final rule, we have assumed that no State has a notification requirement, despite the fact that this will overestimate the burden imposed on covered entities because covered entities have trained their staffs and have prepared procedures to follow when a breach occurs to comply with existing breach notification requirements of most of the States. To ameliorate the overstatement of our cost estimate somewhat, we have assumed the costs for training personnel and for developing procedures for the most part have already been expended and are therefore in the baseline. We did not include these costs in our analysis of the annual costs. We have followed the same approach to estimating the costs as outlined in the interim final rule. We examined the cost of notifying affected individuals by first class mail, issuing substitute notice in major media or on a Web site along with a toll-free phone number, notifying prominent media in the event of a breach involving more than 500 individuals, and notifying the Secretary of a breach, as well as the costs of investigating and documenting breaches. Some commenters requested that we include the cost of modifying contracts with business associates to potentially define the breach notification obligations between the parties. We note that costs to modify business associate agreements generally to comply with the new HITECH provisions are discussed elsewhere in this impact analysis. 31 Department of Labor, Occupational Employment Statistics; Healthcare Practitioner and benefits.31 If we assume 30 minutes per breach for composing the letter, the cost equals $21.48. We assume that it will also take 30 minutes per breach for an administrative assistant to prepare the letter in either email or printed formats and to document the letter to comply with §§ 164.414(a) and 164.530(j). The median hourly wage for office and administrative support staff is $22.53, including 50 percent for benefits. For the 30 minutes, we estimate $11.27 per breach. The combined labor cost for composing and preparing the document is approximately $32.75 per breach. Half of this cost will be allocated to the firstclass letter and the other half to the emails. Although computer costs for sending email will be insignificant, it will take staff time to select the email address from the entity’s mailing list. We assume that an office worker could process and send 200 emails per hour at a cost of $22.53 per hour. For each mailed notice, we assume $0.06 for paper and envelope and $0.45 for a first class stamp, totaling $0.51 per letter. We estimate another $22.53 per hour to prepare the mailing by hand at a rate of 100 letters per hour. Based on our revised estimate of the number of breaches that will occur in a year, we can multiply the number of breaches by the cost of composing and preparing a notice (19,000 × $32.75) equals $622,250. Allocating half the costs to emailing and the same amount to regular mail yields $311,125 to each category. Splitting our estimate of the number of affected individuals evenly between email and regular mail gives us 3,355,000 affected individuals for each notice category. As we did in the interim final rule, for emails we divide affected individuals by the number of emails processed in an hour (200) and multiply the result (16,775 hours) by the hourly cost of $22.53, giving us $377,940. To this number we add the $311,125 giving us an estimated cost for email notices of $689,066. We follow the same method for estimating the cost of mailing notices using postal mail plus the cost of postage and supplies. Dividing 100 letters per hour into 3,355,000 yields 33,550 hours, which is then multiplied by $22.53 to reach $755,882 in labor costs to prepare the mailing. Adding to that the costs of postage and supplies ($1,711,050) and the costs of composing and drafting ($311,125) equals $2,778,057. Summing the cost of email and postal mail notices equals Technical Occupations. Available at https:// www.bls.gov/oes/current/oes_nat.htm. VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 Cost of Notifying Affected Individuals by First Class Mail or Email Section 164.404 requires all covered entities to notify affected individuals of a breach either by first class mail, or if the individual has agreed, by email. In the interim final rule, we assumed that approximately one half of notices sent to affected individuals would be sent via first-class mail, while the rest would be sent via email. By comparison, in the Federal Trade Commission’s (FTC) final breach notification rule, the FTC assumed that 90 percent of the notices sent to individuals affected by a breach requiring notification under the FTC rule would be emailed and only 10 percent would be sent by regular first class mail. Since the firms that the FTC regulates are primarily web-based, assuming that the vast majority of communications would be conducted through email is a reasonable assumption. For HIPAA covered entities, however, 90 percent of which are small businesses or nonprofit organizations that engage the entire U.S. population in providing health care services, we believed that notification through email would be much more limited than in the case of the entities the FTC regulates. Some physician offices have been slow to adopt email communication with their patients for various reasons. We, therefore, assumed that only 50 percent of individuals affected as a result of a breach of unsecured protected health information would receive email notices. As we did not receive any comments on this assumption, we retain it here. As discussed in our analysis in the interim final rule, there will be certain costs that both email and first-class mail notification will share. The cost of drafting and preparing the notice will apply to both forms. The median hourly wage for the labor category of a healthcare practitioner and technical worker in 2011 was approximately $42.96, including 50 percent for fringe PO 00000 Frm 00108 Fmt 4701 Sfmt 4700 E:\FR\FM\25JAR2.SGM 25JAR2 5673 Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations $3,467,122. Table 3 presents the results of our analysis in the order they are discussed above. TABLE 3—COST OF E-MAIL AND FIRST CLASS MAIL TO AFFECTED INDIVIDUALS IN 2011 DOLLARS Mail Email Number of breaches ........................................................................................ Number of affected individuals or records ....................................................... Hours to compose and document notice ........................................................ Cost to compose and document notice ........................................................... Hours to prepare mailing ................................................................................. Cost to prepare mailing ................................................................................... Postage and supplies ...................................................................................... 9,500 ......................... 3,355,000 .................. 9,500 (1 hr per breach). $311,125 ................... 33,550 ....................... $755,882 ................... $1,711,050 ................ 9,500 ......................... 3,355,000 .................. 9,500 (1 hr per breach). $311,125 ................... 16,775 ....................... $377,940 ................... N/A ............................ $622,250 50,325 $1,133,822 $1,711,050 Total .......................................................................................................... sroberts on DSK5SPTVN1PROD with (Annual) Total $2,778,057 ................ $689,066 ................... $3,467,122 19,000 6,710,000 19,000 Cost of Substitute Notice In the event that a HIPAA covered entity is not able to contact an affected individual through email or postal mail, it must attempt to contact the person through some other means. If the number of individuals who cannot be reached through the mailings is less than ten, the entity may attempt to reach them by some other written means, or by telephone. In the event that the covered entity is unable to contact 10 or more affected individuals through email or postal mail, the rule requires the entity to (1) publish a notice in the media (newspaper, television, or radio) or post a notice on its Web site, containing the same information contained in the mailed notice, and (2) set up a toll-free number. The toll-free number is to be included in the media notice or notice on the Web site. Based on the breach notification reports received by the Secretary during calendar years 2010 and 2011, we project that approximately 1,190 breaches affecting 10 or more individuals will require substitute notice (including 5% of breaches involving fewer than 500 individuals, and all 250 breaches involving 500 or more individuals). While several breaches affecting only 1 individual have also required substitute notice, as stated in the interim final rule, we believe the costs for notifying fewer than 10 individuals through alternative written means or by telephone would be very small and as a result we have not attempted to estimate those costs. The interim final rule estimated that it would cost approximately $240 to publish a public notice in a newspaper. Assuming the covered entity will publish two notices, the cost is $480. Multiplying this amount by the 1,190 estimated breaches yields $571,200. Also, as noted in the interim final rule, if a HIPAA covered entity has a Web site, we assume there will be no cost to post the notice to the Web site. We believe this overestimates the overall cost of publishing a notice, as many covered entities will elect to post the public notice only on their Web site, and not in a newspaper. As outlined in the interim final rule, the cost of setting up a toll-free phone number is a straight forward process of contacting any one of a number of service providers who offer toll-free service. The interim final rule found that the prices for toll-free service range from $0.027 per minute for a basic mail box arrangement to $0.07 per minute. A major, national phone service company offers toll-free service for $15 per month per toll-free number and per minute charge of $0.07. There is a one-time charge of $15. As in the interim final rule, we use the costs of $15 per month plus $15 activation fee and $0.07 per minute. Since the regulation requires providers to maintain a toll-free number for three months, the monthly charge plus initial fee per breach will be $60. To estimate the number of calls to the toll-free number, the interim final rule assumed that more individuals than those affected by the breach requiring substitute notice would call out of concern that their protected health information might have been compromised. The interim final rule estimated that a number equal to all affected individuals of all breaches would call the toll-free number. Based on our experience to date, and given that many individuals involved in breaches requiring substitute notice will receive regular notice, we now assume that less than 10 percent of individuals affected by breaches requiring substitute notice will call the toll-free line. Therefore, as we anticipate 6,605,500 total individuals will be affected by breaches requiring substitute notice,32 we assume that no more than 10 percent, or 660,550, will call the tollfree number to determine if they are affected by the breach. We note that while this revision significantly reduces the overall cost to covered entities for providing substitute notice in situations in which there is insufficient or out-ofdate contact information for 10 or more individuals, we believe this estimate is much more appropriate based on the information we have received from covered entities thus far. Using this number and assuming that a call averages five minutes at $0.07 per minute, we estimate the total direct calling costs to equal $231,193. Added to this is $345,000 that represents the monthly fee per breach (1,190 breaches) for three months plus the one-time fee (totaling $60 per breach). This brings the total cost of setting up and maintaining toll-free lines to $576,193. To this cost, we must also include the office staff time to answer the incoming calls at $22.53 per hour. Based on an average of five minutes per call, a staff person could handle 12 calls per hour. Dividing 12 into 660,550 equals approximately 55,046 hours and then multiplied by $22.53 equals $1,240,186. Summing all cost elements yields a total cost of $1,816,379. To the degree that entities already maintain toll-free phone lines, our estimate overstates the costs of setting up a toll-free line as required under the rule. Table 4 presents our cost analysis for the toll-free line. 32 This number includes all individuals affected by breaches involving 500 or more individuals (6,600,000) and 5 percent of individuals affected by breaches involving less than 500 individuals (5,500). VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 PO 00000 Frm 00109 Fmt 4701 Sfmt 4700 E:\FR\FM\25JAR2.SGM 25JAR2 5674 Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations TABLE 4—ANNUAL COST FOR SETTING UP A TOLL-FREE LINE FOR THREE MONTHS IN 2011 DOLLARS Costs Number of breaches affecting fewer than 500 (5,500) Number of breaches 500 + (250) Monthly Charges for 3 months + 1-time Charge ($60/breach) ....................... Direct Calling Charges @ $.07/min × 5 minutes ............................................. Labor cost @ $22.53/hr × 5 min per call ........................................................ Cost to individuals @ $24.86/hr × 7.5 min per call ......................................... $330,000 ........................ ........................ ........................ $15,000 ........................ ........................ ........................ N/A 660,550 660,550 660,550 $345,000 $231,193 $1,240,186 $2,052,665 Total .......................................................................................................... ........................ ........................ ........................ $3,869,044 As in the interim final rule, we have also imputed a cost to the time individuals will spend calling the tollfree number. In estimating the time involved, we assumed that a person will spend five minutes per call. However, the person may not get through the first time and thus may have to call back a second time which could add another 5 minutes. Taking the average between 5 and 10 minutes, we used an average time of 7.5 minutes per caller. For purposes of imputing cost to an individual’s time, we took the median compensation amount from the Bureau of Labor Statistics of $24.86 33 for all occupations. Dividing 60 by 7.5 minutes yields 8 calls per hour. Dividing the number of calls per hour into 660,550 calls and then multiplying by $24.86, gives us a cost of $2,052,665. sroberts on DSK5SPTVN1PROD with Cost of Breaches Involving More Than 500 Individuals If a covered entity experiences a breach of protected health information affecting more than 500 individuals of a State or jurisdiction, § 164.406 of the rule requires the entity to notify the media in the jurisdiction or State in which the individuals reside. In addition, § 164.408 of the rule requires the entity to notify the Secretary contemporaneously with notice to affected individuals in cases where 500 or more individuals are affected by a breach. As stated in the interim final rule, we anticipate that a covered entity will issue a press release when it must notify the media under § 164.406. The tasks involved in issuing the press release will be the drafting of the statement and clearing it through the entity. As discussed in the interim final rule, we assume that drafting a one-page statement will contain essentially the same information provided in the notice to affected individuals and will take 1 hour of an equivalent to a GS–12 33 Department of Labor, Occupational Employment Statistics. https://www.bls.gov/oes/ current/oes_nat.htm. VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 Number of calls Total Federal employee, earning $29 per hour. Adding 50 percent to account for benefits equals $43.50. Approval of the release involves reading the document. We expect this activity to take 15 minutes. The median hourly rate for a public relations manager is approximately $44.86 in 2011.34 Adding 50 percent for benefits equals $67.29, so one quarter of an hour equals $16.82 for approving the release. The total cost of the release equals $61.68, and multiplying this amount by the number of breaches affecting more than 500 individuals (250) equals $15,420. This amount is lower than our previous estimate because we have adopted the more customary and realistic approach of adding 50 percent to wages for benefits, rather than doubling standard wage rates to account for benefits. It should be noted that even this amount may overstate the actual costs of issuing a notice to the media. The report to the Secretary that must be sent contemporaneously with the sending of the notices to the affected individuals will contain essentially the same information as the notice sent to the affected individuals. As stated in the interim final rule, we anticipate the time and cost to prepare the report will be the same as that required for issuing a notice to the media. The cost for reporting to the Secretary the 250 breaches affecting 500 or more individuals is $15,420. At an office manager’s 35 time at $67 per hour ($44.65 median wage plus 50 percent for benefits) multiplied by 4 and 8 hours, results in per breach costs of approximately $268 and $536, respectively. Multiplying $268 by the number of breaches affecting fewer than 10 individuals (17,800 breaches) results in investigation costs of $4,773,616. We then multiply $536 by the number of breaches affecting 10 to 499 individuals (940 breaches), which produces investigation costs of $503,840. Adding the totals for the two groups results in investigation costs of $5,277,456 per year for breaches affecting less than 500 individuals. This estimate includes the time required to produce the documentation required by § 164.414(a). We note that this estimate is significantly higher than that in the interim final rule; however, this is due entirely to the revised estimate that there will be approximately 18,750 breaches affecting fewer than 500 individuals per year. As stated in the interim final rule, for breaches involving 500 or more individuals, the breach investigation may take up to 100 hours to complete; however, we assume that the average investigation will take only 50 hours. At an office manager’s time of $67 per hour multiplied by 50 hours, this cost equals $3,350 per breach. Multiplying this by the number of breaches (250) yields $837,500. Cost of Investigating a Breach Cost of Submitting the Annual Breach Summary to HHS Under § 164.408, covered entities must notify the Secretary of all breaches; however, covered entities reporting breaches affecting fewer than 500 individuals may report these breaches to the Secretary annually. Since the material for the submission has already been gathered and organized for the issuance of the notices to the affected individuals, we expect that notifying the Department will require at As a prerequisite to issuing a notice to individuals, to the media, and to the Secretary, the covered entity will need to conduct an investigation to determine the nature and cause of the breach. We estimate that the 95 percent of breaches in the under 500 category that affect fewer than 10 individuals will require 4 hours of investigation. The other 5 percent of under 500 breaches, which affect between 10 and 499 individuals, may require up to 8 hours to investigate. 34 https://www.bls.gov/oes/current/oes_nat.htm. PO 00000 Frm 00110 Fmt 4701 Sfmt 4700 35 See www.bls.gov/oes/current/oes_nat.htm for All Management Occupations. E:\FR\FM\25JAR2.SGM 25JAR2 Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations most an hour of office staff time once per year. At $22.53 per hour multiplied by the total number of breaches (18,750) affecting fewer than 500 individuals, this cost equals $422,438. 2. Notifying Individuals of Their New Privacy Rights sroberts on DSK5SPTVN1PROD with Covered entities must provide individuals with NPPs that detail how the covered entity may use and disclose protected health information and explain individuals’ rights with respect to their own health information. Because of changes to the HIPAA Rules as a result of the HITECH Act and GINA, the final rule requires covered entities to modify their NPPs and distribute them to individuals to advise them of the following: (1) For health plans that underwrite, the prohibition against health plans using or disclosing PHI that is genetic information about an individual for underwriting purposes; (2) the prohibition on the sale of protected health information without the express written authorization of the individual, as well as the other uses and disclosures for which the rule expressly requires the individual’s authorization (i.e., marketing and disclosure of psychotherapy notes, as appropriate); (3) the duty of a covered entity to notify affected individuals of a breach of unsecured protected health information; (4) for entities that have stated their intent to fundraise in their notice of privacy practices, the individual’s right to opt out of receiving fundraising communications from the covered entity; and (5) the right of the individual to restrict disclosures of protected health information to a health plan with respect to health care for which the individual has paid out of pocket in full. For providers, the costs related to the NPP consist of developing and drafting the revised NPP, and, as discussed below, the potential to incur out-ofcycle printing costs for the revised notice. There are no new costs attributable to the distribution of the revised notice as providers have an ongoing obligation to hand out the NPPs when first-time patients come for their appointments. We estimate that drafting the updated NPPs will require approximately one-third of an hour of professional, legal time at a cost of about $28.36 The total cost for attorneys for the 36 See https://www.bls.gov/oes/current/ naics3_541000.htm#23–0000 for lawyers. Note that we generally calculate labor costs based on the median hourly rate, which for lawyers is $56.21 per hour. We add 50 percent to account for fringe benefits, resulting in an estimated hourly cost of $84.32. VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 approximately 697,000 37 health care providers in the U.S. is, therefore, expected to be approximately $20 million. Printing the NPPs involves production and supplies at a cost of $0.10 per notice. Based on our prior estimates, health care providers are currently required to print and provide the NPP to approximately 613 million new patients annually. We assume that most health care providers will spread the printing of their notices throughout the year, producing copies on a quarterly, monthly, or even more frequent schedule. Further, providers will have 8 months from the publication of the final rule before they will need to produce the revised NPPs, and, therefore, can use that time to adjust their inventory and printing schedule to transition to the revised notice without any additional expense. Thus, assuming a worst case scenario in which all providers would need to replace at most 4 months of old inventory with the revised notice, the need for off-schedule printing of the revised notice for this 4 month period would be attributed to this provision. We estimate, therefore, that providers will print not more than 204 million revised NPPs over and above their existing printing obligations (4/12 × 613 million = 204 million). Printing costs for 204 million NPPs will be $20.4 million (204 million × $0.10 = $20.4 million). Therefore, the total cost for providers is approximately $40.4 million ($20 million + $20.4 million = $40.4 million). For health plans, the costs related to the NPP consist of developing and drafting the revised NPP, and, for certain health plans, the costs of printing and mailing the notice out-ofcycle because the revision is a material change. See § 164.520(c)(1)(v)(A). With the exception of a few large health plans, most health plans do not selfadminister their plans. Most plans are either health insurance issuers (approximately 730) or utilize third party administrators that act on their behalf in the capacity of business associates. We identified approximately 750 third party administrators acting as business associates for ERISA plans. We 37 We identified 698,238 entities that must prepare and deliver NPPs that are shown in Table 1 above. This includes 696,758 HIPAA covered entities that are health care providers, including hospitals, nursing facilities, doctor offices, outpatient care centers, medical diagnostic, imaging service, home health service and other ambulatory care service covered entities, medical equipment suppliers, and pharmacies. For the purposes of our calculation, we have rounded this number to 697,000. Table 1 also includes 730 health insurance carriers and 750 third party administrators working on behalf of covered health plans. The cost estimates for these entities are addressed later. PO 00000 Frm 00111 Fmt 4701 Sfmt 4700 5675 have revised our earlier estimate of 3,500 third party administrators after learning that the majority of these entities act as welfare administrators and do not administer health plans. In addition, some public non-Federal health plans may use third party administrators. Almost all of the public and ERISA plans, we believe, employ third party administrators to administer their health plans. While the third party administrators will bear the direct costs of issuing the revised NPPs, the costs will generally be passed on to the plans that contract with them. Those plans that self-administer their own plans will also incur the costs of issuing the revised NPPs. We do not know how many plans administer as well as sponsor health plans and invited comments on the number of selfadministered plans. As we did not receive comments on this issue, we assume that there are not enough selfadministered plans to have an effect on these estimates. Each of the approximately 1,500 health insurance issuers and health plan administrators will experience the same kinds of costs as we estimated for providers for drafting ($28 per entity) and printing ($0.10 per notice) the NPPs. However, health insurers and plan administrators will have to mail the NPPs to policy holders. We recognize that, under the existing requirement to send new NPPs in a separate mailing to all policy holders, the costs of distributing new NPPs, including clerical time and in some cases, postage, constituted the majority of the overall costs of the rule to covered entities. However, in the proposed rule, we requested comments on alternative ways to inform individuals of material changes to their rights and protections that would be less burdensome and costly. Based on the comments and consistent with E.O. 13563, in this final rule, we have adopted an alternative to the requirement to send the new NPP to all policy holders within 60 days. After consideration, we decided to permit health plans and third party administrators working for health plans to include the revised NPP in their next annual mailing, rather than within 60 days of the material change, if they have a Web site with an NPP. See § 164.520(c)(1)(v)(A). We anticipate that most, if not all, affected entities will take advantage of this option and will not send the NPP in a separate mailing. As such, we expect that the vast majority of health insurers will not incur any out-of-cycle NPP dissemination costs. Nonetheless, to account for any costs that might be incurred by a small E:\FR\FM\25JAR2.SGM 25JAR2 5676 Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations minority of health insurers to distribute the revised NPPs in a separate mailing, we have calculated the costs to these entities of doing so. We describe our methodology in the following paragraphs, beginning with an estimated total number of NPP recipients. We then calculate the costs of printing and sending the revised NPP by separate mailings to all recipients and estimate that no more than 10 percent of these costs will actually be incurred. Because the Privacy Rule requires that only the named insured or policy holder is notified of changes to the health plans’ privacy practices even if that policy also covers dependents, we expect that only policy holders will receive the revised NPPs mandated by this rule. This assumption is consistent with the practices of public programs, such as Medicare, which has a policy of mailing one notice or a set of program materials to a household of four or fewer beneficiaries at the same address. As a result, although there are 50.7 million individual Medicare beneficiaries, the program only sends out approximately 36 million pieces of mail per mailing. Actuarial Research Corporation (ARC), our consultant, estimated the number of policy holders for all classes of insurance products to be approximately 183.6 million, including all public programs. The data comes from the Medical Expenditure Panel Survey from 2004–2006 projected to 2010. ARC estimated 112.6 million private sector policy holders and 71.0 million public ‘‘policy holders.’’ The total, including more recent Medicare data, is 188.3 million persons (which results in roughly a split of 60 percent private policy holders and 40 percent public ‘‘policy holders’’), whom we expect to receive NPPs from their plans. The estimates do not capture policy holders who are in hospitals or nursing homes at the time of the survey, or individuals who may have been insured under more than one plan in a year, for example, because their job status changed, they have supplemental policies, or they have more than one employer, creating duplicate coverage. Therefore, ARC recommended we use 200 million for the number of NPPs that will actually be sent. We estimate the costs of drafting, printing, and distributing the NPP to all potential recipients to be the following. First, drafting the NPP is estimated to require one-third hour of legal services at a cost of $28 × 1,500 insurance plans and insurance administrative entities, which equals $42,000. Second, we need to calculate printing and distribution costs for all potential recipients assuming the revised notice would be sent in a separate mailing. As with providers, we estimate the cost of printing the NPP, which includes the cost of paper and actual printing, to be $0.10 per notice. Therefore, we estimate the cost of printing 200 million notices for mail distribution at $20 million. Further, we estimate the cost of distributing the NPPs, including clerical time and postage in the same manner as these costs were estimated for the Breach Notification for Unsecured Protected Health Information Regulations. Thus, we assume that an office worker could process and send 100 mailings per hour at a cost of $22.53 per hour, plus a postage cost of $0.45 per mailing. If notices were required to be mailed to the 200 million beneficiaries in the sixty-day timeframe, the distribution costs would be $135 million (200 million/100 per hour × $22.53 = $45 million + $90 million (200 million × $0.45)). Total printing and distribution cost would have been $155 million, if all policy holders received separate NPP mailings. Third, as discussed above, we expect that nearly all plans and third party administrators will be able to avoid having to do a separate mailing of the revised notice under the new distribution provisions in this final rule, and that only 10 percent of these plans will incur the printing and distribution costs. Using the above estimates, we assume for this purpose that 20 million notices (200 million total notices × 10%) will be need to be printed and sent through a separate mailing, at a total cost of $15.5 million ($2 million printing + $13.5 million mailing). Therefore, the total cost to all plans for drafting, printing, and distributing the NPP is approximately $15.5 million. We note that even this total may be an overestimation of the costs because many insurers may use bulk mailing rates to distribute their NPPs which would reduce their mailing costs. The total estimated cost for both providers and health plans to notify individuals and policy holders of changes in their privacy rights is approximately $55.9 million in the first year following implementation of the rule. A number of commenters expressed general concern regarding the costs of printing and distributing new NPPs but did not provide estimates of the costs they anticipated or question our calculations. Two health plan commenters estimated that the costs of printing and mailing NPPs to their members could reach up to $100,000. However, they did not provide information about the facts and assumptions underlying their analyses, including the number of beneficiaries or mailings they anticipated, so we were unable to evaluate their estimates. We have addressed some of this concern by permitting health plans that maintain a notice on their web sites to include their NPPs in their annual mailings, rather than separately mailing the NPPs within 60 days of the material changes. Table 5 below presents our analysis of costs to the providers, insurers, and third party administrators that are required to issue NPPs under the rule.38 TABLE 5—SUMMARY OF COMPLIANCE COST FOR NOTICES OF PRIVACY PRACTICES Providers Health insurers & third party administrators Drafting NPPs ..................................................................................................... Printing NPPs ..................................................................................................... Mailing NPPs ...................................................................................................... $20 million .............. $20.4 million ........... N/A ......................... $42,000 .................. $2 million ............... $13.5 million ........... $20 million. $22.4 million. $13.5 million. Total (approx.) ............................................................................................. sroberts on DSK5SPTVN1PROD with Cost elements $40.4 million .......... $15.5 million ........... $55.9 million. 38 Health care clearinghouses function almost exclusively as business associates with respect to VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 the protected health information they maintain and process, and therefore have no NPP requirements. PO 00000 Frm 00112 Fmt 4701 Sfmt 4700 E:\FR\FM\25JAR2.SGM 25JAR2 Total (approx.) sroberts on DSK5SPTVN1PROD with Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations 3. Business Associates and Covered Entities and Their Contractual Relationships The rule extends liability for failure to comply with certain provisions of the Privacy and Security Rules directly to business associates and business associate subcontractors. Prior to this rule and HITECH, these obligations applied to business associates and their subcontractors indirectly through §§ 164.504(e) and 164.314(a), which require that covered entities by contract require business associates to limit uses and disclosures and implement Security Rule-like safeguards. This final rule implements Section 13401 of HITECH Act, which makes business associates directly liable for compliance with many of the same standards and implementation specifications, and applies the same penalties to business associates that apply to covered entities, under the Security Rule. Additionally, in accord with Section 13404 of the HITECH Act, the rule requires business associates to comply with many of the same requirements, and applies the same penalties to business associates that apply to covered entities, under the Privacy Rule. Business associates must also obtain satisfactory assurances in the form of a business associate agreement from subcontractors that the subcontractors will safeguard any protected health information in their possession. Finally, business associates must furnish any information the Secretary requires to investigate whether the business associate is in compliance with the regulations. In the proposed rule, we assumed that business associates’ compliance with their contracts range from the minimal compliance to avoid contract termination to being fully compliant. Further, we assumed that business associates in compliance with their contracts would have already designated personnel to be responsible for formulating the organization’s privacy and security policies, performed a risk analysis, and invested in hardware and software to prevent and monitor for internal and external breaches of protected health information. We also stated in the proposed rule that while business associates were previously required to comply with the HIPAA Rules according to the terms of their contracts with covered entities, and we expected that most business associates did so already, the risk of criminal and/or civil monetary penalties may spur some business associates to increase their efforts to comply with the VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 Rules. We explained that we have no information on the degree of contract enforcement and compliance among business associates, and lack information regarding the size or type of business associates that contract with covered entities. We have only rough estimates as to the overall number of business associates, which range from approximately one million to two million depending on the number of business associates that serve multiple covered entities. While we did not have specific information in this regard, we assumed that some business associates and subcontractors already comply with existing privacy and security standards in accordance with their indirect and contractual obligations. For them, the proposed rule would impose only a limited burden. For other business associates, depending on the current level of compliance, the proposed rule could impose significant burdens. We requested comments regarding the amount of burden and the number of affected business associates. Several commenters stated that requiring business associates to undertake compliance with the rule in the same way as covered entities is excessive and burdensome, especially because in some cases business associates do not have the same type of relationship with individuals. Several commenters pointed to the burden on covered entities and business associates to renegotiate business associate agreements and train staff, and many specifically mentioned that compliance with the Security Rule is particularly costly. One commenter stated that it was a business associate party to ‘‘tens of thousands’’ of business associate contracts, with a significant cost to bring all into compliance. We continue to expect that most business associates and subcontractors have made and continue to make a good-faith effort to follow the terms of their contracts. The burden of the rule on business associates and subcontractors depends on the terms of the contracts between covered entities and business associates and between the business associates and subcontractors, and the degree to which business associates and subcontractors established privacy policies and adopted security measures that comport with the HIPAA Rules. For business associates and subcontractors that have already taken HIPAA-compliant measures to protect the privacy and security of the protected health information in their possession, as required by their existing contracts, the rule imposes limited burden. We PO 00000 Frm 00113 Fmt 4701 Sfmt 4700 5677 estimate the costs to other business associates later in this section. A few commenters cited concerns about unfair competition for smaller business associate entities that they believe will not be able to compete with larger business associate entities, especially with regard to contract negotiations including indemnification and other risk allocation issues. We understand that many small business associates are concerned about the allocation of risk and indemnification in conjunction with their business associate contracts. However, as we discuss in section IV D above, as with any contracting relationship, business associates and covered entities may include other provisions that dictate and describe their business relationship. While these may or may not include indemnification clauses or other risk-shifting provisions, these contractual provisions and relationships are outside the governance of the HIPAA Rules. Because we understand that covered entities and business associates remain concerned with the cost to bring their business associate agreements into compliance with the final rule, we allow contracts to be phased in over one year from the compliance date or 20 months from the publication date of the final rule, and we expect and encourage covered entities and business associates to incorporate the costs of modifying contracts into the normal renegotiation of contracts as the contracts expire. As we did not receive comments to the contrary, we believe that most contracts will be renegotiated over the phase-in period. In addition, the Department has issued on its web site revised sample business associate provisions, which should lessen the costs associated with contract modifications. As we believe covered entities generally are operating under HIPAA compliant contracts with their business associates, the transition period and availability of sample contract provisions should make it possible for these entities to incorporate any minor contract modifications into normal contract renegotiations without any appreciable added costs. We continue to believe that all covered entities have established business associate agreements with their business associates that are consistent with the requirements of the HIPAA Rules, as covered entities have been subject to direct liability under the Rules since their inception and have had more than half a dozen years to make their contracts compliant. However, to the extent that some contracts between covered entities and business associates E:\FR\FM\25JAR2.SGM 25JAR2 5678 Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations sroberts on DSK5SPTVN1PROD with are not currently in full compliance with the business associate agreement provisions, these entities may experience limited costs to revise their contracts. Although we are less certain about the current state of business associatesubcontractor relationships, we believe that most business associates have made a good faith attempt to include the appropriate contractual requirements. Still, we anticipate that some small business associates, now that they are subject to direct liability under the rules, might establish or significantly modify their subcontracts to come into compliance for the first time. Such business associates would not be eligible for the extended transition period and, as a result, would incur the costs of creating new contracts or renegotiating contracts out of cycle. In the Final Privacy Rule published in 2002, we estimated that entities would need between one and two hours to develop and tailor a business associate agreement to their particular needs. See 67 FR 53182, 53257. Taking the average of the lower and upper estimates provided in the earlier rulemaking, we estimate that developing and tailoring contract language normally would take approximately 90 minutes of professional legal services at $84.32 per hour.39 However, as in the 2002 Final Privacy Rule (67 FR 53257), we estimate that providing model language will reduce the time required to develop contract language by at least one third. Thus, we estimate that each new or significantly modified contract between a business associate and its subcontractors will require, at most, one hour of a lawyer’s time at a cost of $84.32. We believe that no more than 25 percent of 1–2 million business associates, or 250,000–500,000 entities, would not have already made good faith efforts to achieve compliance and will need to create or significantly modify subcontracts, resulting in total costs of between $21 million and $42 million. We expect that each business associate’s lawyer will draw up one standard contract to use for all of its subcontracts. We do not attribute contract revision costs to subcontractors because the required contract provisions are not negotiable and subcontractors will need to only sign the agreement. We note that our estimated cost likely 39 See https://www.bls.gov/oes/current/ naics3_541000.htm#23–0000 for lawyers. Note that we generally calculate labor costs based on the median hourly rate, which for lawyers is $56.21 per hour. We add 50 percent to account for fringe benefits, resulting in an estimated hourly cost of $84.32. VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 is an overestimate because the group of small business associates that may be less likely than others to have compliant contracts in place with subcontractors are, because of their size, also less likely to have any subcontractors at all. Finally, in response to the commenters concerned with the cost and burden on business associates to come into full compliance with the Security Rule, we have taken another look at the underlying assumptions in the proposal. We continue to believe that business associates have engaged in privacy practices in compliance with their contractual obligations to use and disclose protected health information as limited by the Privacy Rule and their particular contracts with covered entities. Therefore, as we have stated above, we do not believe that the extension of liability for compliance with Privacy Rule requirements as identified in this rulemaking will impose any new costs or burdens. With regard to the Security Rule, which was of particular concern to commenters as to the compliance costs on business associates, we also continue to believe that business associates, in providing their adequate assurances to safeguard electronic protected health information through their business associate contracts, have implemented security protections that meet the standards and required implementation specifications in the Security Rule. Further, we continue to believe that business associates have made the necessary investment in hardware and software to secure the electronic protected health information as part of the investment in the hardware and software needed for their management and processing of this information to perform their business associate functions and comply with the contract requirements at § 164.314(a). However, based on the comments, we now believe that some business associates, particularly smaller business associates that may have access to electronic protected health information for limited purposes, may not have engaged in certain of the formal administrative safeguards. For example, these entities may not have performed a risk analysis, established a risk management program, or designated a security official, and may not have written policies and procedures, conducted employee training, or documented compliance as required under §§ 164.308 and 164.316 of the Security Rule. We do not have information on what percentage of business associates may have to engage in efforts to comply with some of the administrative safeguard standards, including documenting their PO 00000 Frm 00114 Fmt 4701 Sfmt 4700 policies and procedures and training their employees on the policies and procedures, nor did the comments on the impact statement offer any specific information to provide an estimate. We assume that up to 80 percent of the 1– 2 million business associates, or between 800,000 and 1.6 million business associates, may handle electronic protected health information and thus may have to document their existing security protocols. Further, of these business associates, we assume that no more than 25 percent are likely to incur some cost to document their administrative safeguards and their policies and procedures as now required by statute and these regulations. We believe that our original assumption of compliance with all Security Rule requirements remains sound for the rest of the business associates, and we received no substantive comments to the contrary. The costs of coming into full compliance with the administrative safeguard procedures, such as performance of a risk analysis and development of a risk management plan, will vary depending on the size and complexity of the business associate, the scope of their duties for the covered entity and the protected health information they must secure, and the degree to which their prior documentation of their security protocols falls short of compliance with the standards in the Security Rule. In the original Security Rule, we estimated that covered entities would need approximately 16 hours to document their policies and procedures. See 68 FR 8334, 8368. As these policies and procedures are the reflection of the risk management plan, which in turn is based on the risk analysis, we believe that this estimate would be inclusive of that time. We believe it will take business associates on average much less time to document their security related policies and procedures, because they have likely already engaged in most of the analysis associated with the adoption of security protocols, even if they may not have formally reduced all such protocols to writing, and because the scope of their responsibilities will generally be much more constrained than that of the covered entity with whom they have contracted. In addition, while covered entities must perform these tasks with respect to their entire business, generally only a small part of any business associate is involved with electronic protected health information. Extrapolating from our estimate in the original Security Rule that entities would require approximately 16 hours to implement and document Security E:\FR\FM\25JAR2.SGM 25JAR2 Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations Rule compliance measures for the first time, and applying the assumption that most of these measures already are in place, we estimate that these business associates will need only between 2 and 5 hours to formalize or update their applicable administrative safeguards. We would cost the time needed to come into compliance at $56.61/hour.40 According to these assumptions, the range of costs that any one business associate would incur to comply with the new statutory and regulatory requirements would be between $113 and $283, as first year, one-time costs. Assuming that businesses associates with access to electronic protected health information represent 80 percent of 1 to 2 million total business associates (or 800,000 to 1.6 million total), the aggregated costs for all business associates are estimated to be between approximately $22.6 million and $113 million. (25 percent of 800,000 business associates = 200,000; 200,000 × $113 (2 hr @ $56.61/hr) = $22.6 million. 5679 25 percent of 1.6 million business associates = 400,000; 400,000 × $283 (5 hr @ $56.61/hr) = $113 million.) These costs represent one time first year costs for full compliance by business associates with the Security Rule requirements. Table 6 below presents the range of our estimates of the costs to business associates of achieving compliance with the rules. TABLE 6—BUSINESS ASSOCIATE COST ESTIMATES IN 2011 DOLLARS Data element Security rule compliance documentation Estimated number of affected entities ........................................................................... Hours needed to complete compliance activities .......................................................... Cost per hour ................................................................................................................. Total cost ....................................................................................................................... 200,000–400,000 BAs ........ 2–5 hours per BA ............... $56.61 ................................ $22.6 million–$113 million .. sroberts on DSK5SPTVN1PROD with Response to Other Public Comments Comment: One commenter suggested that business associates will be reluctant to contract with covered entities due to perceived increased risks associated with such contracts, and covered entities will be forced to hire more staff at additional costs. Response: While the HIPAA Rules now impose direct liability with regard to compliance, business associates were previously contractually liable for compliance with these provisions. Further, whether a covered entity uses workforce members or business associates to perform its operations remains a decision for the covered entity. As this commenter did not provide specific information about his concerns, we cannot quantify the costs associated with this comment, nor do we have a basis for concluding that business associates will refuse to contract with covered entities as a result of this rule. Comment: One commenter suggested that requiring business associate agreements will increase the costs of litigation. Response: As business associate agreements were required under the HIPAA Rules previously, and as the commenter did not include specific information about what costs he believes will increase, we do not believe such a requirement will increase litigation generally. 40 We have used the median wage rate described by the U.S. Bureau of Labor Statistics in its 2011 National Compensation Survey for the category of VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 BAA between business associates and subcontractors 250,000–500,000 BAs. 1 hour per BA. $84.32. $21 million–$42 million. a. Authorization for Uses and Disclosures of Protected Health Information for Marketing and Sale of Protected Health Information The final rule modifies the definition of ‘‘marketing’’ to encompass treatment and health care operations communications to individuals about health-related products or services if the covered entity receives financial remuneration in exchange for making the communication from or on behalf of the third party whose product or service is being described. A covered entity must obtain an individual’s written authorization prior to sending marketing communications to the individual. In the proposed rule, we requested comment on the extent to which covered entities currently receive financial remuneration from third parties in exchange for sending information to individuals about the third parties’ health-related products or services. In general, commenters did not indicate that complying with the final rule would be administratively burdensome, but some commenters expressed a general concern over the potential loss of revenue given the new restrictions on receiving financial remuneration from a third party to send health-related communications to an individual. These comments appear to indicate that most covered entities would not attempt to obtain authorizations for the now prohibited communications but rather would forgo making them altogether. We acknowledge the potential for some lost revenue due to these modifications in cases where covered entities are currently receiving financial remuneration from third parties to send health-related communications to individuals. However, as we do not know to what extent covered entities today currently operate in this manner, and commenters did not include specific information in this regard, we do not have data that could inform quantifying such loss. The final rule also requires an individual’s authorization before a covered entity may disclose protected health information in exchange for remuneration (i.e., ‘‘sell’’ protected health information), even if the disclosure is for an otherwise permitted disclosure under the Privacy Rule. The final rule includes several exceptions to this authorization requirement. In the proposed rule, we stated that on its face, this new prohibition would appear to increase the burden to covered entities by requiring them to obtain authorizations in situations in which no authorization is currently required. However, we believed such a scenario to be unlikely. We believed most individuals would not authorize disclosures of their protected health information when they were informed the covered entity would be remunerated for the disclosure. Thus, we believed covered entities would simply discontinue making such disclosures as it would not be Management Analysts (including responsibilities for designing systems and procedures), which is approximately $37.74/hr. See https://www.bls.gov/ oes/current/oes_nat.htm . To this wage rate we have added 50 percent for benefits, which results in a total cost of $56.61/hr. 4. Qualitative Analysis of Unquantified Costs PO 00000 Frm 00115 Fmt 4701 Sfmt 4700 E:\FR\FM\25JAR2.SGM 25JAR2 sroberts on DSK5SPTVN1PROD with 5680 Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations worthwhile for covered entities to continue to attempt to obtain such authorizations. We requested comment on these assumptions. As noted above, the requirement to obtain authorization to receive remuneration to make a disclosure of protected health information contains several exceptions. In the proposed rule, we expressed our belief that covered entities would not incur additional costs to continue making most of the excepted disclosures as such exceptions were not constrained or limited in any way and thus, would not change the status quo. However, we recognized that the exception for research disclosures may impose additional burden on researchers as it was, consistent with the statute, a conditional exception. Covered entities would be able to disclose protected health information under the research exception only to the extent any remuneration received in exchange for the information did not exceed the cost to produce and transmit the information. Thus, we recognized that researchers who purchase data from covered entities may now incur additional costs as a result of the final rule, in order to obtain newly required authorizations, if they are currently paying a covered entity more than the cost to produce and transmit the protected health information (e.g., an incentive payment to produce the data) and the covered entity is not willing to accept only the costs to prepare and transmit the data. It was also recognized that some research may be jeopardized to the extent that authorizations for the entity to receive these incentive payments could not be obtained from subjects. On the other hand, to the extent covered entities agreed to receive only the costs to prepare and transmit the data, these entities would experience a loss of revenue while researchers would experience a corresponding decrease in costs, and current disclosures for research purposes could continue without authorization. While we acknowledged the potential costs under this provision, we stated that we have no information on the amounts currently paid to covered entities by researchers for protected health information, and thus, had no way to estimate the impact of the provision. We solicited comment in this area. Overall, commenters did not indicate that obtaining authorization prior to disclosing protected health information in exchange for remuneration would result in an increased burden or cost for the covered entity. However, one commenter did estimate that obtaining additional authorizations may cost VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 approximately $22 to $28, per patient. Some commenters indicated it may be burdensome to determine if remuneration was in fact received by the entity. The comments on this provision did not alter our belief that, in general, covered entities would discontinue making disclosures in exchange for remuneration that require the individual’s authorization, given the unlikelihood most individuals would agree to authorize such disclosures. Further, there are a number of exceptions to the general prohibition that allow a covered entity to continue to operate ‘‘status quo’’ with respect to a number of types of disclosures, even if the covered entity receives remuneration. In response to the comments, we acknowledge that it may be difficult to determine whether remuneration has been received by a covered entity, particularly since the prohibition encompasses both direct and indirect (i.e., non-financial) remuneration. We expect to issue future guidance on this topic to assist entities in complying. With respect to the amounts currently paid to covered entities by researchers, some commenters indicated as a general concern that limiting remuneration received by covered entities from researchers may provide a disincentive for covered entities to continue assisting researchers in their efforts. However, commenters did not quantify what they are paying covered entities above the costs to prepare and transmit the data, nor did they provide information that would give the Department an idea of the extent to which covered entities receive such payments. Therefore, while we acknowledge the potential for some lost revenue to covered entities due to these modifications or some additional costs to researchers to obtain authorizations, we do not have data that could inform quantifying such costs. At the same time, we note that we have made some clarifications in the above preamble discussion regarding these provisions that we believe would lessen any such impact. Specifically, the preamble explains that we do not consider a sale of protected health information to encompass payments a covered entity may receive in the form of grants, or contracts or other arrangements to perform programs or activities, such as a research study, where any provision of protected health information to the payer is a byproduct of the service being provided. Thus, the payment by a research sponsor to a covered entity to conduct a research study is not considered a sale of protected health information even if the PO 00000 Frm 00116 Fmt 4701 Sfmt 4700 study involves disclosing research results that include protected health information to the sponsor. In contrast, a sale of protected health information includes disclosures of protected health information where a covered entity is receiving remuneration from or on behalf of the recipient of the data for the information itself. Thus, a disclosure of protected health information by a covered entity to a third party researcher that is conducting the research in exchange for remuneration would fall within these provisions, unless the only remuneration received is a reasonable, cost-based fee to cover the cost to prepare and transmit the data for such purposes. b. Individual Right To Opt Out of Fundraising Communications The current Privacy Rule requires covered entities give individuals the opportunity to opt out of receiving future fundraising communications from the entity. The HITECH Act and final rule strengthens the opt out by requiring that it be clear and conspicuous and that an individual’s choice to opt out should be treated as a revocation of authorization. While the rule specified that a clear and conspicuous opt out method must not cause an individual to incur an undue burden or more than a nominal cost, proposed rule did not specify the method to be employed but rather left it up to the discretion of the covered entity. We requested comment on the extent to which the requirement that the opportunity to elect not to receive further fundraising communications be clear and conspicuous would have an impact on covered entities and their current fundraising materials. Overall, commenters did not indicate that requiring the opt out for further fundraising to be clear and conspicuous would greatly impact covered entities and their current fundraising efforts or provide specific anticipated costs in this regard. Rather, some commenters indicated that they already provide prepaid, pre-printed postcards for this purpose with fundraising mailings and doing so is neither costly nor imposes a significant burden on the individual who wishes to opt out of further communications. Based on this feedback and the continued flexibility in the final rule to choose the opt out method (e.g., toll-free number, postcard), we do not believe that the requirement that fundraising opt-outs be clear and conspicuous will result in significant new costs to covered entities. Further, while some commenters did indicate that a pre-solicitation opt out would be costly for covered entities in E:\FR\FM\25JAR2.SGM 25JAR2 Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations sroberts on DSK5SPTVN1PROD with response to our request for comment on this issue, as a result of this general opposition, the final rule does not change the current requirement that covered entities only need to include an opt-out with any solicitation sent to an individual rather than to the first fundraising communication. c. Individuals’ Access to Protected Health Information In this final rule, we strengthen an individual’s right to receive an electronic copy of his or her protected health information. Specifically, as was proposed, the final rule requires that if an individual requests an electronic copy of protected health information that is maintained electronically in one or more designated record sets, the covered entity must provide the individual with access to the electronic information in the electronic form and format requested by the individual, if it is readily producible, or, if not, in a readable electronic form and format as agreed to by the covered entity and the individual. Also, as in the proposed rule, the final rule provides that a covered entity may charge a fee for costs associated with labor and supplies for creating an electronic copy, including electronic portable media if agreed to by the individual, and clarifies that a covered entity may charge for postage if an individual requests that the covered entity transmit portable media containing an electronic copy through mail or courier. However, covered entities may not include fees associated with maintaining systems, retrieval costs, or infrastructure costs in the fee they charge to provide an electronic copy. We continue to believe that this requirement will not result in significant new burdens on covered entities. Individuals already had a right to access protected health information maintained in electronic designated record sets under the prior Rule, and already had a right to receive an electronic copy of such information to the extent the electronic copy was readily producible by the covered entity. The Rule provides significant flexibility to covered entities in honoring individuals’ request for electronic access. While a covered entity must provide some type of electronic copy to an individual who requests one, a covered entity is not required to provide the exact form of the copy or access requested by the individual if it is not readily producible in such form. Thus, covered entities may provide readily producible electronic copies of protected health information that are currently available on their various VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 systems. A covered entity is not required to purchase new software or systems in order to accommodate an electronic copy request for a specific form that is not readily producible by the covered entity at the time of the request, provided that the covered entity is able to provide some form of electronic copy. Further, in cases where an individual chooses not to accept the electronic copy that is readily producible by the covered entity, a hard copy may be offered. We did hear from several commenters that some legacy or other systems, while capable of producing a hard copy as previously required under the existing access requirement, may not be capable of producing any electronic copy at present. In these cases, covered entities may incur some cost burden in order to purchase software or hardware to produce some kind of electronic copy for electronic information held in designated record sets on such legacy systems. However, covered entities are not required to purchase additional software or hardware to meet individuals’ specific requests, as long as at least one type of electronic copy is available. We anticipate some cost will be incurred by covered entities with such systems; however we did not receive comments on the extent of these costs, or the number of covered entities with legacy systems that will need to incur such costs. d. Right To Restrict Certain Disclosures to a Health Plan The final rule requires that a covered health care provider agree in most cases to an individual’s request to restrict disclosure to a health plan of the individual’s protected health information that pertains to a health care service for which the individual has paid the health care provider in full out of pocket. This is a change from the prior rule, which provided individuals with the right to request a restriction on certain disclosures; however, a covered entity was not required to agree to the restriction, whatever the circumstances. We do not believe that covered health care providers will incur substantial costs to implement this expanded right for a number of reasons. First, in order to comply with the rule prior to this change, a covered entity is already required to have processes and procedures in place for accepting and considering individuals’ requests for restrictions, even if, as a general matter, the covered entity declines to agree to such requests. This final rule does not require new or different processes for receiving and reviewing requests for restrictions, just that the covered entity PO 00000 Frm 00117 Fmt 4701 Sfmt 4700 5681 honor, in most cases, a self-pay patient’s request for a restriction to a health plan. Second, for those covered health care providers that do not currently, but will now be required to, accommodate requests by self-pay patients to restrict disclosures to a health plan, the final rule provides significant flexibility in how providers are to honor an individual’s request and the preamble makes various clarifications in response to comments as to how to operationalize this new requirement. For example, the final rule makes clear that a health care provider is not required to separate or segregate records in order to ensure an individual’s restriction request is honored. Rather, the final rule leaves it to the discretion of the provider as to how to flag information that is the subject of a restriction. Further, the final rule provides flexibility as to how restriction requests for certain services, such as bundled services, are to be handled, as well as what reasonable efforts should be made to obtain payment from an individual whose original form of payment has been dishonored, prior to resorting to billing the health plan for the service. Finally, in response to comments regarding the potential burden and cost of doing so, the final rule does not require health care providers to inform downstream providers who may receive the individual’s protected health information, such as a pharmacy or specialist, of a restriction, given the lack of automated technologies to support such a requirement. Notwithstanding the above, we acknowledge that there will be some additional burden on certain health care providers to ensure an individual’s request to restrict a disclosure to a health plan is honored where such a request would not have been honored in the past. However, we do not have data to inform quantifying an estimated cost in this area. For example, we do not have data on the number of providers that currently accommodate requests from self-pay patients to restrict disclosures versus those that do not, the number of requests that covered health care providers receive today that would now require a restriction, nor even the number of requests for restrictions generally that covered health care providers currently receive. e. Impact of the Genetic Information Underwriting Prohibition on Health Plans The final rule prohibits health plans that are HIPAA covered entities, except issuers of long term care policies, from using or disclosing an individual’s protected health information that is E:\FR\FM\25JAR2.SGM 25JAR2 sroberts on DSK5SPTVN1PROD with 5682 Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations genetic information for underwriting purposes. As we explained in the proposed rule, the rule does not affect health plans that do not currently use or disclose protected health information for underwriting purposes. Further, even with respect to health plans that perform underwriting, plans and issuers in the group market previously commented to the Department that they do not, even prior to the passage of GINA, use genetic information for underwriting purposes because preGINA laws and regulations prohibit them from discriminating against individuals based on any health status related factors, including genetic information. With respect to issuers in the individual health insurance market, the Department acknowledged in the proposed rule that there may be more significant policy changes associated with the prohibition on using or disclosing protected health information that is genetic information for underwriting purposes. However, the Department explained in the proposed rule that it did not have sufficient information to determine the extent of such changes, that is, to what extent issuers in the individual health insurance market use genetic information for underwriting purposes. Regardless, as we explained in the proposed rule, in the case of either the individual or group market, the Department assumed, because a prohibited use or disclosure of genetic information for underwriting purposes would also be a discriminatory use of such information under the nondiscrimination provisions of GINA Title I and its implementing regulations, that there would be no costs associated with conforming a plan’s practices to comply with the underwriting prohibition that are above and beyond the costs associated with complying with the regulations implementing sections 101–103 of GINA. With respect to the health plans not covered by GINA but subject to the proposed prohibition in the Privacy Rule, the Department also assumed that the costs to comply would be minimal because such plans either: (1) do not perform underwriting, as is the case generally with public benefit plans; or (2) perform underwriting but do not in most cases use genetic information (including family medical history) for such purposes. In general, most comments in response to the proposed rule did not provide information that contradicted the above assumptions. However, concern was expressed regarding the adverse impact of such an underwriting prohibition on the long-term care VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 market. Given the concern regarding the impact of the underwriting prohibition on the long-term care market, the final rule exempts such plans from the prohibition. Thus, there are no costs to be attributed to long term care plans with this rule. Further, given we did not receive other comments that would lead us to question the underlying assumptions in the proposed rule, we do not expect this provision of the final rule to result in substantial new costs on health plans, particularly those that have been required to comply with the regulations implementing GINA’s nondiscrimination provisions for several years now. f. Enforcement Provisions The amendments contained within this final rule to the HIPAA Enforcement Rule conform the regulatory language of the Rule to the enhanced enforcement provisions of the HITECH Act. Consistent with its reasoning in prior HIPAA Enforcement rulemakings,41 the Department expects the costs covered entities, and now business associates, may incur with respect to their compliance with the Enforcement Rule, itself, should be low in most cases. That is, covered entities and business associates that comply with the HIPAA rules voluntarily, as is expected, should not incur any additional, significant costs as a result of the Enforcement Rule. Further, we believe the increased penalties and other enhancements provided by the HITECH Act and which are reflected in this final rule provide even more incentive to covered entities and business associates to take steps necessary to comply and thus not be liable for violations. D. Qualitative Analysis of Unquantified Benefits While we are certain that the regulatory changes in this final rule represent significant benefits, we cannot monetize their value. Many commenters agreed with our assumptions regarding the benefits to individuals, but we did not receive any comments that included specific information about quantifying those benefits. The following sections describe in greater detail the qualitative benefits of the final rule. In addition to greater privacy protections for individuals, these benefits include the results of our efforts to reduce burdens. Consistent with E.O. 13563, we conducted a retrospective review of our regulations and identified areas, such as 41 See the preambles to the proposed and final Enforcement Rules at 70 FR 20224, 20248–49 (April 18, 2005) and 71 FR 8390, 8424 (February 16, 2006). PO 00000 Frm 00118 Fmt 4701 Sfmt 4700 certain research authorization requirements and disclosures to schools regarding childhood immunizations, in which we could decrease costs and increase flexibilities under the HIPAA Rules. The resulting changes are discussed below. 1. Greater Privacy Protections for Individuals The benefits for individuals include added information on their rights through an expanded NPP, and greater rights with regard to the uses and disclosures of their personal health information through expanded requirements to: (1) Obtain authorization before a covered entity or business associate may disclose their protected health information in exchange for remuneration, (2) restrict certain disclosures to a health plan at the request of the individual, (3) strengthen the ability of individuals to opt out of further fundraising communications, and (4) limit uses and disclosures of protected health information for marketing. Individuals also will benefit from increased protection against discrimination based on their genetic information, achieved through the prohibition against health plans using or disclosing protected health information that is genetic information for underwriting purposes. Individuals also will have increased access to their protected health information in an electronic format. Finally, under the rule, individuals’ health information will be afforded greater protection by business associates of covered entities who share liability and responsibility with the covered entity for safeguarding against impermissible uses and disclosures of protected health information. 2. Breach Notification The analysis of benefits of the breach notification regulation is as stated in the interim final rule. In summary, we stated that notifying individuals affected by a breach would alert them to and enable them to mitigate potential harms, such as identity theft resulting from the exposure of certain identifiers, and reputational harm that may result from the exposure of sensitive medical information. Further, the breach notification requirements provide incentive to covered entities and business associates to better safeguard protected health information, such as by encrypting the information, where possible. We also believe that the modifications to the definition of breach to remove the harm standard and revise the risk assessment will ensure that covered E:\FR\FM\25JAR2.SGM 25JAR2 Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations entities and business associates apply the rule in a more objective and uniform manner. We believe that these modifications will make the rule easier for covered entities and business associates to implement and will result in consistency of notification across entities which will benefit consumers. sroberts on DSK5SPTVN1PROD with 3. Compound Authorizations for Research Uses and Disclosures We proposed to permit compound authorizations for the use or disclosure of protected health information for conditioned and unconditioned research activities provided that the authorization clearly differentiates between the conditioned and unconditioned research components and clearly allows the individual the option to opt in to the unconditioned research activities. We believed that the proposed provision would reduce burden and costs on the research community by eliminating the need for multiple forms for research studies involving both a clinical trial and a related biospecimen banking activity or study and by harmonizing the Privacy Rule’s authorization requirements with the informed consent requirements under the Common Rule. This change to the Rule had long been sought by the research community. While we expected burden reduction and cost savings due to these modifications, we had no data which to quantify an estimate of such savings. We requested comment on the anticipated savings that this change would bring to the research community. As explained above, the final rule adopts the proposal to permit compound research authorizations. While almost all commenters on this topic were supportive and agreed that the change would result in reduced burdens and costs due to a reduction in forms and harmonization with the Common Rule, we did not receive significant comment that could inform our quantifying the anticipated costsavings associated with this modification. 4. Authorizations for Future Research Uses or Disclosures We requested comment on the Department’s previous interpretation that an authorization for research uses and disclosures must include a description of each purpose of the requested use or disclosure that is study specific, and the possibility of modifying this interpretation to allow for the authorization of future research uses and disclosures. We believed that this change in interpretation would reduce burden on covered entities and VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 researchers by reducing the need for researchers to obtain multiple authorizations from the same individual for research and further harmonizing the Privacy Rule authorization requirements with the informed consent requirements under the Common Rule. The final rule adopts the new interpretation to allow covered entities to obtain authorizations for future research uses and disclosures to the extent such purposes are adequately described in the authorization such that it would be reasonable for the individual to expect that his or her protected health information could be used or disclosed for such future research. While we did receive comments supporting our assertions that permitting authorizations for future research uses and disclosures would reduce burden to covered entities and researchers by obviating the need for researchers to seek out past research participants to obtain authorization for future studies which they may be able to authorize at the initial time of enrollment into a study, and additionally by reducing the waivers of authorization that researchers would need to obtain from Institutional Review Boards, we did not receive specific comment on cost savings that could inform our quantifying the savings in this final rule. 5. Period of Protection for Decedent Information We proposed to modify the current rule to limit the period for which a covered entity must protect an individual’s health information to 50 years after the individual’s death. We believed this would reduce the burden on both covered entities and those seeking the protected health information of persons who have been deceased for many years by eliminating the need to search for and find a personal representative of the decedent, who in many cases may not be known or even exist after so many years, to authorize the disclosure. We believed this change would also benefit family members and historians who may seek access to the medical information of these decedents for personal and public interest reasons. However, we lacked any data to be able to estimate the benefits (or any unanticipated costs) of this provision and requested comment on these assertions. The final rule adopts the modification to limit the period of protection for decedent health information to 50 years after the date of death. While most comments responding to this proposal were very supportive of the change, agreeing with the anticipated benefits PO 00000 Frm 00119 Fmt 4701 Sfmt 4700 5683 the Department had articulated (i.e., easier access to old or ancient patient health information by family, historians, archivists), the comments did not provide specific information that could inform our quantifying a cost-savings or reduction in burden associated with this change in policy. The Department did receive one comment asserting that covered entities may keep decedent information, particularly the information of famous individuals, for longer than 50 years past the date of death in order to monetize those records. The commenter cited an example of an x-ray of a deceased celebrity being sold at an auction for $45,000. However, we do not anticipate that this is or will be a typical scenario. 6. Disclosures About a Decedent We proposed to permit covered entities to disclose a decedent’s protected health information to family members and others who were involved in the care or payment for care prior to the decedent’s death, unless doing so is inconsistent with any prior expressed preference of the individual that is known to the covered entity. In the preamble to the proposed rule, we stated our belief that the proposed change would reduce burden by permitting covered entities to disclose protected health information about a decedent to family members and other persons who were involved in an individual’s care while the individual was alive, without having to obtain written permission in the form of an authorization from the decedent’s personal representative, who may not be known or even exist, and may be more difficult to locate as time passes. However, we had no data to permit us to estimate the reduction in burden and requested public comment on this issue. The final rule adopts the modification as proposed. However, as with the proposed rule, we are unable to quantify any cost-savings with respect this change. While commenters confirmed that permitting such disclosures would help facilitate communications with family members and other persons who were involved in an individual’s care or payment for care prior to death, we did not receive any information that could inform estimating a savings. 7. Public Health Disclosures We proposed to create a new public health provision to permit disclosure of proof of a child’s immunization by a covered entity to a school in States that have school entry or similar laws. This proposed change would have allowed a covered health care provider to release E:\FR\FM\25JAR2.SGM 25JAR2 sroberts on DSK5SPTVN1PROD with 5684 Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations proof of immunization to a school without having to obtain a written authorization, provided the provider obtained the agreement, which may be oral, to the disclosure from a parent, guardian or other person acting in loco parentis for the individual, or from the individual, if the individual was an adult or emancipated minor. We anticipated that the proposed change to the regulations would reduce the burden on parents, schools, and covered entities in obtaining and providing written authorizations, and would minimize the amount of school missed by students. However, because we lacked data on the burden reduction, we were unable to provide an estimate of the possible savings and requested comment on this point. The final rule adopts the proposal to permit covered entities to disclose, with the oral or written agreement of a parent or guardian, a child’s proof of immunization to schools in States that have school entry or similar laws. This obviates the need for a covered entity to receive formal, executed HIPAA authorizations for such disclosures. While the final rule requires that covered entities document the agreement, the final rule is flexible and does not prescribe the nature of the documentation and does not require signature by the parent, allowing covered entities the flexibility to determine what is appropriate for their purposes. For example, as the preamble indicates above, if a parent or guardian submits a written or email request to a covered entity to disclose their child’s immunization records to the child’s school, a copy of the request would suffice as documentation of the agreement. Likewise, if a parent or guardian calls the covered entity and requests over the phone that their child’s immunization records be disclosed to the child’s school, a notation in the child’s medical record or elsewhere of the phone call would suffice as documentation of the agreement. Given that the rule no longer requires a formal, executed HIPAA authorization for such disclosures and provides significant flexibility in the form of the documentation required of a parent’s or guardian’s agreement to the disclosure, this modification is expected to result in reduced burden and cost to covered health care providers in making these disclosures, as well as to the parents and schools involved in the process. We acknowledge that covered health care providers who wish to use these less formal processes in lieu of the authorization will need to explain their new procedure to office staff. However, VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 given the provision’s flexibility and narrow scope, we do not expect that the providers will need to do more than ensure office staff have a copy of the new procedure. Further, any one-time costs to develop and deploy the new procedure will be offset by the savings that are expected to accrue from the change over time as the disclosures are carried out. While we acknowledge the overall savings associated with this change, as with other provisions in this rule providing increased flexibility for compliance, we are unable to quantify them. For example, we do not have data on how many family doctors and other providers generally make these types of disclosures and how many requests such providers generally receive for proof of immunization, and we did not receive data from commenters that could inform our estimating savings in this area. E. Additional Regulatory Analyses 1. Regulatory Flexibility Act The Regulatory Flexibility Act requires agencies to analyze and consider options for reducing regulatory burden if the regulation will impose a significant burden on a substantial number of small entities. The Act requires the head of the agency to either certify that the rule would not impose such a burden or perform a regulatory flexibility analysis and consider alternatives to lessen the burden. For the reasons stated below, it is not expected that the cost of compliance will be significant for small entities. Nor is it expected that the cost of compliance will fall disproportionately on small entities. Although many of the covered entities and business associates affected by the rule are small entities, they do not bear a disproportionate cost burden compared to the other entities subject to the rule. Further, with respect to small business associates, only the fraction of these entities that has not made a good faith effort to comply with existing requirements will experience additional costs under the rule. The Department did not receive any comments on its certification in the proposed rules. Therefore, the Secretary certifies that this rule will not have a significant economic impact on a substantial number of small entities. The RFA generally defines a ‘‘small entity’’ as (1) a proprietary firm meeting the size standards of the Small Business Administration (SBA), (2) a nonprofit organization that is not dominant in its field, or (3) a small government jurisdiction with a population of less than 50,000. The SBA size standard for health care providers ranges between PO 00000 Frm 00120 Fmt 4701 Sfmt 4700 $7.0 million and $34.5 million in annual receipts. Because 90 percent or more of all health care providers meet the SBA size standard for a small business or are nonprofit organizations, we generally treat all health care providers as small entities for purposes of performing a regulatory flexibility analysis. With respect to health insurers and third party administrators, the SBA size standard is $7.0 million in annual receipts. While some insurers are classified as nonprofit, it is possible they are dominant in their market. For example, a number of Blue Cross/Blue Shield insurers are organized as nonprofit entities; yet they dominate the health insurance market in the States where they are licensed and therefore would not be considered small businesses. Using the SBA’s definition of a small insurer as a business with less than $7 million in revenues, premiums earned as a measure of revenue,42 and data obtained from the National Association of Insurance Commissioners,43 the Department estimates that approximately 276 out of 730 insurers had revenues of less than $7 million.44 From the approximately $225.4 million (upper estimate) in costs we are able to identify, the cost per covered entity may be as low as $80 (for the vast majority of covered entities) and as high as $843 (for those entities that experience a breach), and we estimate that the cost per affected business associate will be between $84.32 and $282. These costs are discussed in detail in the regulatory impact analysis and below. We do not view this as a significant burden because, for example, even the highest average compliance cost per covered entity we have identified ($843) represents just 0.0001% of annual revenues for a small entity with only $7 million in receipts (see the low end of SBA’s size standard for health care providers). We include 750 third party administrators in the calculation of covered entities, to represent approximately 2.5 million ERISA plans,45 most of which are small entities, on whose behalf they carry our 42 U.S. Small Business Administration, ‘‘Table of Small Business Standards Matched to North American Industry Classification System Codes,’’ available at https://www.sba.gov/content/smallbusiness-size-standards. 43 HHS ASPE analysis of 2010 NAIC Supplemental Health Care Exhibit Data. 44 These counts could be an overestimate. Only health insurance premiums from both the group and individual market were counted. If insurers also offered other types of insurance, their revenues could be higher. 45 Source: 2010 Medical Expenditure Survey— Insurance Component. E:\FR\FM\25JAR2.SGM 25JAR2 sroberts on DSK5SPTVN1PROD with Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations compliance activities. We have no information on how many of these plans self-administer, and we did not receive any information from commenters in this area and so do not include a separate estimate for plans that selfadminister. We estimate that the breach notification requirements will result in $14.5 million in annual costs to covered entities. Dividing that amount by the approximately 19,000 entities that will actually experience a breach of protected health information each year, we estimate that the costs of complying with the breach notification requirements will amount to, on average, $763 per covered entity that must respond to a breach. Smaller covered entities likely will face much lower costs, as these entities generally have protected health information for far fewer individuals than do larger covered entities and breach notification costs are closely linked to the number of individuals affected by a given breach incident. The other source of costs for covered entities arises from the requirement to provide revised NPPs to the individuals they serve. We estimate that the approximately 700,000 covered entities will experience total costs of approximately $55.9 million for compliance with the NPP requirements, or about $80 per covered entity. We estimate the costs for 200,000– 400,000 business associates to come into full compliance with the Security Rule to be approximately $22.6–$113 million. The average cost per affected business associate would be approximately $198. Finally, we estimate that 250,000 to 500,000 business associates will incur costs totaling between $21 million and $42 million, respectively, to establish or significantly modify contracts with subcontractors to be in compliance with the rule’s requirements for business associate agreements. The average cost per business associate would be approximately $84. Based on the relatively small cost per covered entity and per business associate, the Secretary certifies that the Rule will not have a significant impact on a substantial number of small entities. Still, we considered and adopted several solutions for reducing the burden on small entities. First, we combined several required rules into one rulemaking, which will allow affected entities to revise and distribute their notices of privacy practices at one time rather than multiple times, as each separate rule was published. Second, in the final rule we increase flexibility for health plans by allowing them to send the revised VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 notices with their annual mailings rather than requiring plans to send them to individuals in a separate mailing. Third, we allow covered entities and business associates with existing HIPAA compliant contracts twelve months from the date of the rule to renegotiate their contracts unless the contract is otherwise renewed or modified before such date. This amount of time plus the eight months from the publication date of the rule to the compliance date generally gives the parties 20 months to renegotiate their agreements. We believe that the added time will reduce the cost to revise agreements because the changes the rule requires will be incorporated into the routine updating of covered entities’ and business associates’ contracts. Finally, the Department has also published on its web site sample language for revising the contracts between covered entities and business associates. While the language is generic and may not suit all entities and agreements, particularly larger entities and those with more complex business relationships, we believe that it will particularly help small entities with their contract revisions and save them time and money in redrafting their contracts to conform to the rule. 2. Unfunded Mandates Reform Act Section 202 of the Unfunded Mandates Reform Act of 1995 (UMRA) requires that agencies assess anticipated costs and benefits before issuing any rule whose mandates would require spending in any one year $100 million in 1995 dollars, updated annually for inflation. In 2011, that threshold is approximately $136 million. UMRA does not address the total cost of a rule. Rather, it focuses on certain categories of cost, mainly those ‘‘Federal mandate’’ costs resulting from: (1) Imposing enforceable duties on State, local, or Tribal governments, or on the private sector; or (2) increasing the stringency of conditions in, or decreasing the funding of, State, local, or Tribal governments under entitlement programs. We are able to identify between $114 and $225.4 million in costs on both the private sector and State and Federal entities for compliance with the final modifications to the HIPAA Privacy and Security Rules, and for compliance with the final Breach Notification Rule. As stated above, there may be other costs we are not able to monetize because we lack data, and the rule may produce savings that may offset some or all of the added costs. We must also separately identify costs to be incurred by the private sector and those incurred by State and Federal entities. PO 00000 Frm 00121 Fmt 4701 Sfmt 4700 5685 Some of the costs of the regulation will fall on covered entities, which are primarily health care providers and health plans.46 For the purpose of these calculations, we included all provider costs as private sector costs. While we recognize that some providers are State or Federal entities, we do not have adequate information to estimate the number of public providers, but we believe the number to be significantly less than 10 percent of all providers shown in Table 1. Therefore, as we did for the RFA analysis and for ease of calculation, we assumed that all provider costs are private sector costs. We did not receive any comments on this assumption. With respect to health plans, based on the data discussed in section C, we estimate that 60 percent of policy holders are served by private sector health plans and 40 percent of policy holders are served by public sector plans. Therefore, we attribute 60 percent of health plan costs to the private sector and 40 percent of plan costs to the public sector. The remaining costs of complying with the regulation will be borne by business associates of covered entities. We do not have data with which to estimate the numbers of private versus public entity business associates. However, we believe that the vast majority of, if not all, business associates, are private entities. Therefore, we assumed all business associate costs are private sector costs. Of the specific costs we can identify, we estimate that approximately 91 percent of all costs, or between $103.7 and $205 million, will fall on private sector health care providers, health plans, and business associates. The remaining costs, approximately $10.3– 20.4 million, will fall on public sector health plans. The following paragraphs outline the distribution of costs arising from the four cost-bearing elements of the final rule: (1) Covered entities must revise and distribute notices of privacy practices, (2) Covered entities that experience a breach of protected health information must comply with the breach notification requirements, (3) certain business associates must revise contracts with subcontractors to meet business associate agreement requirements, and (4) Certain business associates must make efforts to achieve full compliance with the administrative requirements of the Security Rule. 46 Another type of covered entity, health care clearinghouses, generally will not bear these costs, as clearinghouses are not required to provide a notice of private practices to individuals and are involved in a miniscule fraction of breach incidents, if any. E:\FR\FM\25JAR2.SGM 25JAR2 5686 Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations We estimate the costs for to comply with the NPP provisions will reach about $55.9 million, which will be shared by providers and health plans. Providers will bear approximately $40.4 million of these costs, all of which we attribute to the private sector. Health plans will bear approximately $15.5 million and, as explained above, we have allocated 60 percent of health plan costs for NPPs, or $9.3 million, as private sector costs. Public plans will bear the remaining $6.2 million. We estimate that private entities will bear 93 percent of the costs of compliance with the breach notification requirements, or about $13.5 million. This is because the majority of breach reports are filed by health care providers, all of whose costs we attribute to the private sector. Consistent with our estimate that 60 percent of health plan members are enrolled in private sector plans, we also include as private costs 60 percent of the breach notification costs borne by health plans (based on the number of health plans that have filed breach reports). Finally, we estimate that all of the costs for business associates to create or revise business associate agreements with subcontractors ($42 million outer estimate), and to come into full compliance with the Security Rule ($113 million outer estimate), will be private sector costs. As the estimated costs to private entities alone may exceed the $136 million threshold, UMRA requires us to prepare an analysis of the costs and benefits of the rule. We have already done so, in accordance with Executive Orders 12866 and 13563, and present this analysis in sections C and D. 3. Federalism Executive Order 13132 establishes certain requirements that an agency must meet when it promulgates a rule that imposes substantial direct requirement costs on State and local governments, preempts State law, or otherwise has Federalism implications. The Federalism implications of the Privacy and Security Rules were assessed as required by Executive Order 13132 and published as part of the preambles to the final rules on December 28, 2000 (65 FR 82462, 82797) and February 20, 2003 (68 FR 8334, 8373), respectively. Regarding preemption, the preamble to the final Privacy Rule explains that the HIPAA statute dictates the relationship between State law and Privacy Rule requirements. Therefore, the Privacy Rule’s preemption provisions do not raise Federalism issues. The HITECH Act, at section 13421(a), provides that the HIPAA preemption provisions shall apply to the HITECH provisions and requirements. While we have made minor technical changes to the preemption provisions in Subpart B of Part 160 to conform to and incorporate the HITECH Act preemption provisions, these changes do not raise new Federalism issues. The changes include: (1) Amending the definitions of ‘‘contrary’’ and ‘‘more stringent’’ to reference business associates; and (2) further amending the definition of contrary to provide that State law would be contrary to the HIPAA Administrative Simplification provisions if it stands as an obstacle to the accomplishment and execution of the full purposes and objectives of not only HIPAA, but also the HITECH Act. We do not believe that the rule will impose substantial direct compliance costs on State and local governments that are not required by statute. It is our understanding that State and local government covered entities do not engage in marketing, the sale of protected health information, or fundraising. Therefore, the modifications in these areas would not cause additional costs to State and local governments. We anticipate that the most significant direct costs on State and local governments will be the cost for State and local government-owned covered entities of drafting, printing, and distributing revised notices of privacy practices, which would include the cost of mailing these notices for State health plans, such as Medicaid. However, the costs involved can be attributed to the statutory requirements, which provide individuals with strengthened rights about which they need to be notified. In considering the principles in and requirements of Executive Order 13132, the Department has determined that these modifications to the Privacy and Security Rules will not significantly affect the rights, roles, and responsibilities of the States. F. Accounting Statement Whenever a rule is considered a significant rule under Executive Order 12866, we are required to develop an accounting statement indicating the costs associated with promulgating the rule. Below, we present overall monetary annualized costs discounted at 3 percent and 7 percent as described in the Regulatory Impact Analysis. ESTIMATED COSTS OF THE FINAL RULE [In 2011 millions] Primary estimate ($M) Costs (annualized) sroberts on DSK5SPTVN1PROD with Discounted @7% ............................................................................................................. @3% ................................................................................................................................ In the RIA, we acknowledged several potential sources of costs that we were unable to quantify. Because we have no way to determine the extent to which entities currently engage in certain activities for which they now need authorization, or who will need to take on a new burden because of the rule, we cannot predict the magnitude of these costs with any certainty. These potential sources of cost include: 1. Potential lost revenue to covered entities who forgo making certain VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 subsidized health-related communications to individuals rather than obtain those individuals’ authorization for such communications; 2. Costs to researchers to obtain authorization to make incentive payments (above the costs to prepare the data) to covered entities to produce data or, alternatively, a loss in revenue for covered entities who agree to accept only the costs to prepare and transmit the data; PO 00000 Frm 00122 Fmt 4701 Sfmt 4700 Minimum estimate ($M) 42.8 35.2 34.8 28.7 Maximum estimate ($M) 50.6 41.7 3. Potential costs to certain covered entities who purchase software or hardware to allow them to produce an electronic copy of individuals’ protected health information; and 4. The burden to some health care providers of ensuring that an individual’s request to restrict a disclosure to a health plan is honored where it might not have been before the final rule. While we are certain the changes in this final rule also represent distinct E:\FR\FM\25JAR2.SGM 25JAR2 Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations benefits to individuals with regard to the privacy and security of their health information, and with regard to their rights to that information, we are unable to quantify the benefits. Other expected qualitative benefits, which are described in detail above, include savings due to provisions simplifying and streamlining requirements and increasing flexibility. Such savings arise from: 1. Eliminating the need for multiple forms for certain research studies by permitting compound authorizations; 2. Obviating the need to find past research participants and obtain new authorizations for new research by allowing individuals to authorize future research uses and disclosures at the time of initial enrollment; 3. Limiting the period of protection for decedent information to permit family members and historians to obtain information about a decedent without needing to find a personal representative of the deceased individual to authorize the disclosure; 4. Permitting disclosures to a decedent’s family members or others involved in the care or payment for care prior to the decedent’s death; and 5. Permitting covered entities to document a parent’s informal agreement to disclose immunization information to a child’s school rather than requiring a signed authorization form. VIII. Collection of Information Requirements This final rule contains the following information collections (i.e., reporting, recordkeeping, and third-party disclosures) under the Paperwork Reduction Act. Some of those provisions involve changes from the information collections set out in the proposed and interim final rules. These changes are noted below. sroberts on DSK5SPTVN1PROD with A. Reporting • Notification to the Secretary of breaches of unsecured protected health information (§ 164.408). In the final rule, we revise our estimated number of respondents and responses to reflect our experience administering the interim final rule. B. Recordkeeping • Documentation of safeguards and policies and procedures under the Security Rule (§ 164.316). In the proposed rule, we assumed that all business associates were in compliance with the Security Rule’s documentation standard because of their contractual obligations to covered entities under the HIPAA Rules. In the final rule, we recognize that a minority of business associates, who have not previously VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 maintained documentation of their policies and procedures and administrative safeguards under the Security Rule, may experience a burden coming into compliance with the documentation standard for the first time because they are now subject to direct liability under the Security Rule. • Business Associate Agreements (§ 164.504(e)). We assumed in the proposed rule that business associates and their subcontractors were complying with their existing contractual obligations but acknowledged that some contracts would have to be modified to reflect changes in the law. We requested comments on how many entities would be unable able to revise contracts, in the normal course of business, within the phase-in period. We did not receive comments that would allow us to make a specific estimate; nonetheless, in the final rule we assume that a significant minority of business associates will need to revise their business associate agreements with subcontractors (or establish such agreements for the first time if they were not previously in compliance). C. Third-Party Disclosures Frm 00123 Fmt 4701 Sfmt 4700 List of Subjects 45 CFR Part 160 Administrative practice and procedure, Computer technology, Electronic information system, Electronic transactions, Employer benefit plan, Health, Health care, Health facilities, Health insurance, Health records, Hospitals, Investigations, Medicaid, Medical research, Medicare, Penalties, Privacy, Reporting and record keeping requirements, Security. 45 CFR Part 164 Administrative practice and procedure, Computer technology, Electronic information system, Electronic transactions, Employer benefit plan, Health, Health care, Health facilities, Health insurance, Health records, Hospitals, Medicaid, Medical research, Medicare, Privacy, Reporting and record keeping requirements, Security. For the reasons set forth in the preamble, the Department amends 45 CFR Subtitle A, Subchapter C, parts 160 and 164, as set forth below: PART 160—GENERAL ADMINISTRATIVE REQUIREMENTS 1. The authority citation for part 160 is revised to read as follows: ■ • Breach notification to affected individuals and the media (§§ 164.404 & 164.406). We revise our estimates of the numbers of breaches, covered entities, and individuals affected to reflect our experience in administering the breach notification requirements under the interim final rule. • Revision and dissemination of notices of privacy practices for protected health information (§ 164.520). Our burden estimates for this provision in the proposed rule were based on the requirement for covered entities to send a separate mailing containing the new notice to each policy holder. As part of an effort to reduce overall burden, the final rule instead permits health plans to send the revised notice of privacy practices in their next annual mailing to policy holders, allowing them to avoid additional distribution burdens. We also revise the estimated number of affected covered entities based on updated information from the Department of Labor and the Small Business Administration. In addition to the changes summarized above, the information collections described in this final rule have been submitted to the Office of Management and Budget for review and approval. PO 00000 5687 Authority: 42 U.S.C. 1302(a); 42 U.S.C. 1320d–1320d–9; sec. 264, Pub. L. 104–191, 110 Stat. 2033–2034 (42 U.S.C. 1320d–2 (note)); 5 U.S.C. 552; secs. 13400–13424, Pub. L. 111–5, 123 Stat. 258–279; and sec. 1104 of Pub. L. 111–148, 124 Stat. 146–154. ■ 2. Revise § 160.101 to read as follows: § 160.101 Statutory basis and purpose. The requirements of this subchapter implement sections 1171–1180 of the Social Security Act (the Act), sections 262 and 264 of Public Law 104–191, section 105 of Public Law 110–233, sections 13400–13424 of Public Law 111–5, and section 1104 of Public Law 111–148. ■ 3. Amend § 160.102 as follows: ■ a. Redesignate paragraph (b) as paragraph (c); and ■ b. Add new paragraph (b) to read as follows: § 160.102 Applicability. * * * * * (b) Where provided, the standards, requirements, and implementation specifications adopted under this subchapter apply to a business associate. * * * * * ■ 4. Amend § 160.103 as follows: ■ a. Revise the definitions of ‘‘Business associate’’, ‘‘Compliance date’’, E:\FR\FM\25JAR2.SGM 25JAR2 5688 Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations ‘‘Disclosure’’, ‘‘Electronic media’’, the introductory text of the definition of ‘‘Health information’’, paragraphs (1)(vi) through (xi), and (xv) of the definition of ‘‘Health plan’’, paragraph (2) of the definition of ‘‘Protected health information,’’ and the definitions of ‘‘Standard’’, ‘‘State’’, and ‘‘Workforce’’; and ■ b. Add, in alphabetical order, new definitions of ‘‘Administrative simplification provision’’, ‘‘ALJ’’, ‘‘Civil money penalty or penalty’’, ‘‘Family member’’, ‘‘Genetic information’’, ‘‘Genetic services’’, ‘‘Genetic test’’, ‘‘Manifestation or manifested’’, ‘‘Respondent’’, ‘‘Subcontractor’’, and ‘‘Violation or violate’’. The revisions and additions read as follows: § 160.103 Definitions. sroberts on DSK5SPTVN1PROD with * * * * * Administrative simplification provision means any requirement or prohibition established by: (1) 42 U.S.C. 1320d–1320d–4, 1320d– 7, 1320d–8, and 1320d–9; (2) Section 264 of Pub. L. 104–191; (3) Sections 13400–13424 of Public Law 111–5; or (4) This subchapter. ALJ means Administrative Law Judge. * * * * * Business associate: (1) Except as provided in paragraph (4) of this definition, business associate means, with respect to a covered entity, a person who: (i) On behalf of such covered entity or of an organized health care arrangement (as defined in this section) in which the covered entity participates, but other than in the capacity of a member of the workforce of such covered entity or arrangement, creates, receives, maintains, or transmits protected health information for a function or activity regulated by this subchapter, including claims processing or administration, data analysis, processing or administration, utilization review, quality assurance, patient safety activities listed at 42 CFR 3.20, billing, benefit management, practice management, and repricing; or (ii) Provides, other than in the capacity of a member of the workforce of such covered entity, legal, actuarial, accounting, consulting, data aggregation (as defined in § 164.501 of this subchapter), management, administrative, accreditation, or financial services to or for such covered entity, or to or for an organized health care arrangement in which the covered entity participates, where the provision of the service involves the disclosure of protected health information from such VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 covered entity or arrangement, or from another business associate of such covered entity or arrangement, to the person. (2) A covered entity may be a business associate of another covered entity. (3) Business associate includes: (i) A Health Information Organization, E-prescribing Gateway, or other person that provides data transmission services with respect to protected health information to a covered entity and that requires access on a routine basis to such protected health information. (ii) A person that offers a personal health record to one or more individuals on behalf of a covered entity. (iii) A subcontractor that creates, receives, maintains, or transmits protected health information on behalf of the business associate. (4) Business associate does not include: (i) A health care provider, with respect to disclosures by a covered entity to the health care provider concerning the treatment of the individual. (ii) A plan sponsor, with respect to disclosures by a group health plan (or by a health insurance issuer or HMO with respect to a group health plan) to the plan sponsor, to the extent that the requirements of § 164.504(f) of this subchapter apply and are met. (iii) A government agency, with respect to determining eligibility for, or enrollment in, a government health plan that provides public benefits and is administered by another government agency, or collecting protected health information for such purposes, to the extent such activities are authorized by law. (iv) A covered entity participating in an organized health care arrangement that performs a function or activity as described by paragraph (1)(i) of this definition for or on behalf of such organized health care arrangement, or that provides a service as described in paragraph (1)(ii) of this definition to or for such organized health care arrangement by virtue of such activities or services. Civil money penalty or penalty means the amount determined under § 160.404 of this part and includes the plural of these terms. * * * * * Compliance date means the date by which a covered entity or business associate must comply with a standard, implementation specification, requirement, or modification adopted under this subchapter. * * * * * Disclosure means the release, transfer, provision of access to, or divulging in PO 00000 Frm 00124 Fmt 4701 Sfmt 4700 any manner of information outside the entity holding the information. * * * * * Electronic media means: (1) Electronic storage material on which data is or may be recorded electronically, including, for example, devices in computers (hard drives) and any removable/transportable digital memory medium, such as magnetic tape or disk, optical disk, or digital memory card; (2) Transmission media used to exchange information already in electronic storage media. Transmission media include, for example, the Internet, extranet or intranet, leased lines, dial-up lines, private networks, and the physical movement of removable/transportable electronic storage media. Certain transmissions, including of paper, via facsimile, and of voice, via telephone, are not considered to be transmissions via electronic media if the information being exchanged did not exist in electronic form immediately before the transmission. * * * * * Family member means, with respect to an individual: (1) A dependent (as such term is defined in 45 CFR 144.103), of the individual; or (2) Any other person who is a firstdegree, second-degree, third-degree, or fourth-degree relative of the individual or of a dependent of the individual. Relatives by affinity (such as by marriage or adoption) are treated the same as relatives by consanguinity (that is, relatives who share a common biological ancestor). In determining the degree of the relationship, relatives by less than full consanguinity (such as half-siblings, who share only one parent) are treated the same as relatives by full consanguinity (such as siblings who share both parents). (i) First-degree relatives include parents, spouses, siblings, and children. (ii) Second-degree relatives include grandparents, grandchildren, aunts, uncles, nephews, and nieces. (iii) Third-degree relatives include great-grandparents, great-grandchildren, great aunts, great uncles, and first cousins. (iv) Fourth-degree relatives include great-great grandparents, great-great grandchildren, and children of first cousins. Genetic information means: (1) Subject to paragraphs (2) and (3) of this definition, with respect to an individual, information about: (i) The individual’s genetic tests; (ii) The genetic tests of family members of the individual; E:\FR\FM\25JAR2.SGM 25JAR2 sroberts on DSK5SPTVN1PROD with Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations (iii) The manifestation of a disease or disorder in family members of such individual; or (iv) Any request for, or receipt of, genetic services, or participation in clinical research which includes genetic services, by the individual or any family member of the individual. (2) Any reference in this subchapter to genetic information concerning an individual or family member of an individual shall include the genetic information of: (i) A fetus carried by the individual or family member who is a pregnant woman; and (ii) Any embryo legally held by an individual or family member utilizing an assisted reproductive technology. (3) Genetic information excludes information about the sex or age of any individual. Genetic services means: (1) A genetic test; (2) Genetic counseling (including obtaining, interpreting, or assessing genetic information); or (3) Genetic education. Genetic test means an analysis of human DNA, RNA, chromosomes, proteins, or metabolites, if the analysis detects genotypes, mutations, or chromosomal changes. Genetic test does not include an analysis of proteins or metabolites that is directly related to a manifested disease, disorder, or pathological condition. * * * * * Health information means any information, including genetic information, whether oral or recorded in any form or medium, that: * * * * * * * * Health plan means * * * (1) * * * (vi) The Voluntary Prescription Drug Benefit Program under Part D of title XVIII of the Act, 42 U.S.C. 1395w–101 through 1395w–152. (vii) An issuer of a Medicare supplemental policy (as defined in section 1882(g)(1) of the Act, 42 U.S.C. 1395ss(g)(1)). (viii) An issuer of a long-term care policy, excluding a nursing home fixed indemnity policy. (ix) An employee welfare benefit plan or any other arrangement that is established or maintained for the purpose of offering or providing health benefits to the employees of two or more employers. (x) The health care program for uniformed services under title 10 of the United States Code. (xi) The veterans health care program under 38 U.S.C. chapter 17. * * * * * VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 (xv) The Medicare Advantage program under Part C of title XVIII of the Act, 42 U.S.C. 1395w–21 through 1395w–28. * * * * * Manifestation or manifested means, with respect to a disease, disorder, or pathological condition, that an individual has been or could reasonably be diagnosed with the disease, disorder, or pathological condition by a health care professional with appropriate training and expertise in the field of medicine involved. For purposes of this subchapter, a disease, disorder, or pathological condition is not manifested if the diagnosis is based principally on genetic information. * * * * * Protected health information * * * (2) Protected health information excludes individually identifiable health information: (i) In education records covered by the Family Educational Rights and Privacy Act, as amended, 20 U.S.C. 1232g; (ii) In records described at 20 U.S.C. 1232g(a)(4)(B)(iv); (iii) In employment records held by a covered entity in its role as employer; and (iv) Regarding a person who has been deceased for more than 50 years. * * * * * Respondent means a covered entity or business associate upon which the Secretary has imposed, or proposes to impose, a civil money penalty. * * * * * Standard means a rule, condition, or requirement: (1) Describing the following information for products, systems, services, or practices: (i) Classification of components; (ii) Specification of materials, performance, or operations; or (iii) Delineation of procedures; or (2) With respect to the privacy of protected health information. * * * * * State refers to one of the following: (1) For a health plan established or regulated by Federal law, State has the meaning set forth in the applicable section of the United States Code for such health plan. (2) For all other purposes, State means any of the several States, the District of Columbia, the Commonwealth of Puerto Rico, the Virgin Islands, Guam, American Samoa, and the Commonwealth of the Northern Mariana Islands. Subcontractor means a person to whom a business associate delegates a function, activity, or service, other than PO 00000 Frm 00125 Fmt 4701 Sfmt 4700 5689 in the capacity of a member of the workforce of such business associate. * * * * * Violation or violate means, as the context may require, failure to comply with an administrative simplification provision. Workforce means employees, volunteers, trainees, and other persons whose conduct, in the performance of work for a covered entity or business associate, is under the direct control of such covered entity or business associate, whether or not they are paid by the covered entity or business associate. ■ 5. Add § 160.105 to subpart A to read as follows: § 160.105 Compliance dates for implementation of new or modified standards and implementation specifications. Except as otherwise provided, with respect to rules that adopt new standards and implementation specifications or modifications to standards and implementation specifications in this subchapter in accordance with § 160.104 that become effective after January 25, 2013, covered entities and business associates must comply with the applicable new standards and implementation specifications, or modifications to standards and implementation specifications, no later than 180 days from the effective date of any such standards or implementation specifications. ■ 6. Revise § 160.201 to read as follows: § 160.201 Statutory basis. The provisions of this subpart implement section 1178 of the Act, section 262 of Public Law 104–191, section 264(c) of Public Law 104–191, and section 13421(a) of Public Law 111– 5. ■ 7. In § 160.202, revise the definition of ‘‘Contrary’’ and paragraph (1)(i) of the definition of ‘‘More stringent’’ to read as follows: § 160.202 Definitions. * * * * * Contrary, when used to compare a provision of State law to a standard, requirement, or implementation specification adopted under this subchapter, means: (1) A covered entity or business associate would find it impossible to comply with both the State and Federal requirements; or (2) The provision of State law stands as an obstacle to the accomplishment and execution of the full purposes and objectives of part C of title XI of the Act, E:\FR\FM\25JAR2.SGM 25JAR2 5690 Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations section 264 of Public Law 104–191, or sections 13400–13424 of Public Law 111–5, as applicable. More stringent * * * (1) * * * (i) Required by the Secretary in connection with determining whether a covered entity or business associate is in compliance with this subchapter; or * * * * * ■ 8. Revise § 160.300 to read as follows: § 160.300 Applicability. This subpart applies to actions by the Secretary, covered entities, business associates, and others with respect to ascertaining the compliance by covered entities and business associates with, and the enforcement of, the applicable provisions of this part 160 and parts 162 and 164 of this subchapter. § 160.302 [Removed and Reserved] 9. Remove and reserve § 160.302. 10. Revise § 160.304 to read as follows: ■ ■ (a) Cooperation. The Secretary will, to the extent practicable and consistent with the provisions of this subpart, seek the cooperation of covered entities and business associates in obtaining compliance with the applicable administrative simplification provisions. (b) Assistance. The Secretary may provide technical assistance to covered entities and business associates to help them comply voluntarily with the applicable administrative simplification provisions. ■ 11. In § 160.306, revise paragraphs (a) and (c) to read as follows: sroberts on DSK5SPTVN1PROD with Complaints to the Secretary. (a) Right to file a complaint. A person who believes a covered entity or business associate is not complying with the administrative simplification provisions may file a complaint with the Secretary. * * * * * (c) Investigation. (1) The Secretary will investigate any complaint filed under this section when a preliminary review of the facts indicates a possible violation due to willful neglect. (2) The Secretary may investigate any other complaint filed under this section. (3) An investigation under this section may include a review of the pertinent policies, procedures, or practices of the covered entity or business associate and of the circumstances regarding any alleged violation. (4) At the time of the initial written communication with the covered entity VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 § 160.308 Compliance reviews. (a) The Secretary will conduct a compliance review to determine whether a covered entity or business associate is complying with the applicable administrative simplification provisions when a preliminary review of the facts indicates a possible violation due to willful neglect. (b) The Secretary may conduct a compliance review to determine whether a covered entity or business associate is complying with the applicable administrative simplification provisions in any other circumstance. ■ 13. Revise § 160.310 to read as follows: § 160.310 Responsibilities of covered entities and business associates. § 160.304 Principles for achieving compliance. § 160.306 or business associate about the complaint, the Secretary will describe the acts and/or omissions that are the basis of the complaint. ■ 12. Revise § 160.308 to read as follows: (a) Provide records and compliance reports. A covered entity or business associate must keep such records and submit such compliance reports, in such time and manner and containing such information, as the Secretary may determine to be necessary to enable the Secretary to ascertain whether the covered entity or business associate has complied or is complying with the applicable administrative simplification provisions. (b) Cooperate with complaint investigations and compliance reviews. A covered entity or business associate must cooperate with the Secretary, if the Secretary undertakes an investigation or compliance review of the policies, procedures, or practices of the covered entity or business associate to determine whether it is complying with the applicable administrative simplification provisions. (c) Permit access to information. (1) A covered entity or business associate must permit access by the Secretary during normal business hours to its facilities, books, records, accounts, and other sources of information, including protected health information, that are pertinent to ascertaining compliance with the applicable administrative simplification provisions. If the Secretary determines that exigent circumstances exist, such as when documents may be hidden or destroyed, a covered entity or business associate must permit access by the Secretary at any time and without notice. (2) If any information required of a covered entity or business associate under this section is in the exclusive PO 00000 Frm 00126 Fmt 4701 Sfmt 4700 possession of any other agency, institution, or person and the other agency, institution, or person fails or refuses to furnish the information, the covered entity or business associate must so certify and set forth what efforts it has made to obtain the information. (3) Protected health information obtained by the Secretary in connection with an investigation or compliance review under this subpart will not be disclosed by the Secretary, except if necessary for ascertaining or enforcing compliance with the applicable administrative simplification provisions, if otherwise required by law, or if permitted under 5 U.S.C. 552a(b)(7). ■ 14. Revise § 160.312 to read as follows: § 160.312 Secretarial action regarding complaints and compliance reviews. (a) Resolution when noncompliance is indicated. (1) If an investigation of a complaint pursuant to § 160.306 or a compliance review pursuant to § 160.308 indicates noncompliance, the Secretary may attempt to reach a resolution of the matter satisfactory to the Secretary by informal means. Informal means may include demonstrated compliance or a completed corrective action plan or other agreement. (2) If the matter is resolved by informal means, the Secretary will so inform the covered entity or business associate and, if the matter arose from a complaint, the complainant, in writing. (3) If the matter is not resolved by informal means, the Secretary will— (i) So inform the covered entity or business associate and provide the covered entity or business associate an opportunity to submit written evidence of any mitigating factors or affirmative defenses for consideration under §§ 160.408 and 160.410 of this part. The covered entity or business associate must submit any such evidence to the Secretary within 30 days (computed in the same manner as prescribed under § 160.526 of this part) of receipt of such notification; and (ii) If, following action pursuant to paragraph (a)(3)(i) of this section, the Secretary finds that a civil money penalty should be imposed, inform the covered entity or business associate of such finding in a notice of proposed determination in accordance with § 160.420 of this part. (b) Resolution when no violation is found. If, after an investigation pursuant to § 160.306 or a compliance review pursuant to § 160.308, the Secretary determines that further action is not E:\FR\FM\25JAR2.SGM 25JAR2 Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations warranted, the Secretary will so inform the covered entity or business associate and, if the matter arose from a complaint, the complainant, in writing. ■ 15. In § 160.316, revise the introductory text to read as follows: § 160.316 Refraining from intimidation or retaliation. A covered entity or business associate may not threaten, intimidate, coerce, harass, discriminate against, or take any other retaliatory action against any individual or other person for— * * * * * ■ 16. In § 160.401, revise the definition of ‘‘Reasonable cause’’ to read as follows: § 160.401 * * * * Reasonable cause means an act or omission in which a covered entity or business associate knew, or by exercising reasonable diligence would have known, that the act or omission violated an administrative simplification provision, but in which the covered entity or business associate did not act with willful neglect. * * * * * ■ 17. Revise § 160.402 to read as follows: sroberts on DSK5SPTVN1PROD with Basis for a civil money penalty. (a) General rule. Subject to § 160.410, the Secretary will impose a civil money penalty upon a covered entity or business associate if the Secretary determines that the covered entity or business associate has violated an administrative simplification provision. (b) Violation by more than one covered entity or business associate. (1) Except as provided in paragraph (b)(2) of this section, if the Secretary determines that more than one covered entity or business associate was responsible for a violation, the Secretary will impose a civil money penalty against each such covered entity or business associate. (2) A covered entity that is a member of an affiliated covered entity, in accordance with § 164.105(b) of this subchapter, is jointly and severally liable for a civil money penalty for a violation of part 164 of this subchapter based on an act or omission of the affiliated covered entity, unless it is established that another member of the affiliated covered entity was responsible for the violation. (c) Violation attributed to a covered entity or business associate. (1) A covered entity is liable, in accordance with the Federal common law of agency, for a civil money penalty for a violation VerDate Mar<15>2010 18:57 Jan 24, 2013 § 160.404 Amount of a civil money penalty. * Definitions. * § 160.402 based on the act or omission of any agent of the covered entity, including a workforce member or business associate, acting within the scope of the agency. (2) A business associate is liable, in accordance with the Federal common law of agency, for a civil money penalty for a violation based on the act or omission of any agent of the business associate, including a workforce member or subcontractor, acting within the scope of the agency. ■ 18. In § 160.404, revise the introductory text of paragraphs (b)(2)(i), (b)(2)(iii), and (b)(2)(iv) to read as follows: Jkt 229001 * * * * (b) * * * (2) * * * (i) For a violation in which it is established that the covered entity or business associate did not know and, by exercising reasonable diligence, would not have known that the covered entity or business associate violated such provision, * * * * * (iii) For a violation in which it is established that the violation was due to willful neglect and was corrected during the 30-day period beginning on the first date the covered entity or business associate liable for the penalty knew, or, by exercising reasonable diligence, would have known that the violation occurred, * * * * * (iv) For a violation in which it is established that the violation was due to willful neglect and was not corrected during the 30-day period beginning on the first date the covered entity or business associate liable for the penalty knew, or, by exercising reasonable diligence, would have known that the violation occurred, * * * * * ■ 19. Revise § 160.406 to read as follows: § 160.406 Violations of an identical requirement or prohibition. The Secretary will determine the number of violations of an administrative simplification provision based on the nature of the covered entity’s or business associate’s obligation to act or not act under the provision that is violated, such as its obligation to act in a certain manner, or within a certain time, or to act or not act with respect to certain persons. In the case of continuing violation of a provision, a separate violation occurs each day the covered entity or business associate is in violation of the provision. PO 00000 Frm 00127 Fmt 4701 Sfmt 4700 5691 20. Revise § 160.408 to read as follows: ■ § 160.408 Factors considered in determining the amount of a civil money penalty. In determining the amount of any civil money penalty, the Secretary will consider the following factors, which may be mitigating or aggravating as appropriate: (a) The nature and extent of the violation, consideration of which may include but is not limited to: (1) The number of individuals affected; and (2) The time period during which the violation occurred; (b) The nature and extent of the harm resulting from the violation, consideration of which may include but is not limited to: (1) Whether the violation caused physical harm; (2) Whether the violation resulted in financial harm; (3) Whether the violation resulted in harm to an individual’s reputation; and (4) Whether the violation hindered an individual’s ability to obtain health care; (c) The history of prior compliance with the administrative simplification provisions, including violations, by the covered entity or business associate, consideration of which may include but is not limited to: (1) Whether the current violation is the same or similar to previous indications of noncompliance; (2) Whether and to what extent the covered entity or business associate has attempted to correct previous indications of noncompliance; (3) How the covered entity or business associate has responded to technical assistance from the Secretary provided in the context of a compliance effort; and (4) How the covered entity or business associate has responded to prior complaints; (d) The financial condition of the covered entity or business associate, consideration of which may include but is not limited to: (1) Whether the covered entity or business associate had financial difficulties that affected its ability to comply; (2) Whether the imposition of a civil money penalty would jeopardize the ability of the covered entity or business associate to continue to provide, or to pay for, health care; and (3) The size of the covered entity or business associate; and (e) Such other matters as justice may require. E:\FR\FM\25JAR2.SGM 25JAR2 5692 Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations 21. Revise § 160.410 to read as follows: ■ sroberts on DSK5SPTVN1PROD with § 160.410 Affirmative defenses. (a) The Secretary may not: (1) Prior to February 18, 2011, impose a civil money penalty on a covered entity or business associate for an act that violates an administrative simplification provision if the covered entity or business associate establishes that the violation is punishable under 42 U.S.C. 1320d–6. (2) On or after February 18, 2011, impose a civil money penalty on a covered entity or business associate for an act that violates an administrative simplification provision if the covered entity or business associate establishes that a penalty has been imposed under 42 U.S.C. 1320d–6 with respect to such act. (b) For violations occurring prior to February 18, 2009, the Secretary may not impose a civil money penalty on a covered entity for a violation if the covered entity establishes that an affirmative defense exists with respect to the violation, including the following: (1) The covered entity establishes, to the satisfaction of the Secretary, that it did not have knowledge of the violation, determined in accordance with the Federal common law of agency, and by exercising reasonable diligence, would not have known that the violation occurred; or (2) The violation is— (i) Due to circumstances that would make it unreasonable for the covered entity, despite the exercise of ordinary business care and prudence, to comply with the administrative simplification provision violated and is not due to willful neglect; and (ii) Corrected during either: (A) The 30-day period beginning on the first date the covered entity liable for the penalty knew, or by exercising reasonable diligence would have known, that the violation occurred; or (B) Such additional period as the Secretary determines to be appropriate based on the nature and extent of the failure to comply. (c) For violations occurring on or after February 18, 2009, the Secretary may not impose a civil money penalty on a covered entity or business associate for a violation if the covered entity or business associate establishes to the satisfaction of the Secretary that the violation is— (1) Not due to willful neglect; and (2) Corrected during either: (i) The 30-day period beginning on the first date the covered entity or business associate liable for the penalty knew, or, by exercising reasonable VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 diligence, would have known that the violation occurred; or (ii) Such additional period as the Secretary determines to be appropriate based on the nature and extent of the failure to comply. ■ 22. Revise § 160.412 to read as follows: requirements, and implementation specifications under part C of title XI of the Act, section 264 of Public Law 104– 191, and sections 13400–13424 of Public Law 111–5. ■ 27. In § 164.104, revise paragraph (b) to read as follows: § 160.412 * Waiver. For violations described in § 160.410(b)(2) or (c) that are not corrected within the period specified under such paragraphs, the Secretary may waive the civil money penalty, in whole or in part, to the extent that the payment of the penalty would be excessive relative to the violation. ■ 23. Revise § 160.418 to read as follows: § 160.418 Penalty not exclusive. Except as otherwise provided by 42 U.S.C. 1320d–5(b)(1) and 42 U.S.C. 299b–22(f)(3), a penalty imposed under this part is in addition to any other penalty prescribed by law. ■ 24. Amend § 160.534 as follows: ■ a. Revise paragraph (b)(1)(iii); ■ b. Add paragraph (b)(1)(iv); and ■ c. Revise paragraph (b)(2). The revisions read as follows: § 160.534 The hearing. * * * * * (b)(1) * * * (iii) Claim that a proposed penalty should be reduced or waived pursuant to § 160.412 of this part; and (iv) Compliance with subpart D of part 164, as provided under § 164.414(b). (2) The Secretary has the burden of going forward and the burden of persuasion with respect to all other issues, including issues of liability other than with respect to subpart D of part 164, and the existence of any factors considered aggravating factors in determining the amount of the proposed penalty. * * * * * PART 164—SECURITY AND PRIVACY 25. The authority citation for part 164 is revised to read as follows: ■ Authority: 42 U.S.C. 1302(a); 42 U.S.C. 1320d–1320d–9; sec. 264, Pub. L. 104–191, 110 Stat. 2033–2034 (42 U.S.C. 1320d– 2(note)); and secs. 13400–13424, Pub. L. 111– 5, 123 Stat. 258–279. 26. Revise § 164.102 to read as follows: ■ § 164.102 Statutory basis. The provisions of this part are adopted pursuant to the Secretary’s authority to prescribe standards, PO 00000 Frm 00128 Fmt 4701 Sfmt 4700 § 164.104 Applicability. * * * * (b) Where provided, the standards, requirements, and implementation specifications adopted under this part apply to a business associate. ■ 28. Amend § 164.105 as follows: ■ a. Revise the introductory text of paragraph (a)(1), the introductory text of paragraph (a)(2)(i), paragraph (a)(2)(ii), the introductory text of paragraph (a)(2)(iii), and paragraphs (a)(2)(iii)(A) and (B); ■ b. Redesignate paragraph (a)(2)(iii)(C) as paragraph (a)(2)(iii)(D) and add new paragraph (a)(2)(iii)(C); ■ c. Revise newly redesignated paragraph (a)(2)(iii)(D); and ■ d. Revise paragraph (b). The revisions read as follows: § 164.105 Organizational requirements. (a)(1) Standard: Health care component. If a covered entity is a hybrid entity, the requirements of this part, other than the requirements of this section, § 164.314, and § 164.504, apply only to the health care component(s) of the entity, as specified in this section. (2) * * * (i) Application of other provisions. In applying a provision of this part, other than the requirements of this section, § 164.314, and § 164.504, to a hybrid entity: * * * * * (ii) Safeguard requirements. The covered entity that is a hybrid entity must ensure that a health care component of the entity complies with the applicable requirements of this part. In particular, and without limiting this requirement, such covered entity must ensure that: (A) Its health care component does not disclose protected health information to another component of the covered entity in circumstances in which subpart E of this part would prohibit such disclosure if the health care component and the other component were separate and distinct legal entities; (B) Its health care component protects electronic protected health information with respect to another component of the covered entity to the same extent that it would be required under subpart C of this part to protect such information if the health care E:\FR\FM\25JAR2.SGM 25JAR2 sroberts on DSK5SPTVN1PROD with Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations component and the other component were separate and distinct legal entities; (C) If a person performs duties for both the health care component in the capacity of a member of the workforce of such component and for another component of the entity in the same capacity with respect to that component, such workforce member must not use or disclose protected health information created or received in the course of or incident to the member’s work for the health care component in a way prohibited by subpart E of this part. (iii) Responsibilities of the covered entity. A covered entity that is a hybrid entity has the following responsibilities: (A) For purposes of subpart C of part 160 of this subchapter, pertaining to compliance and enforcement, the covered entity has the responsibility of complying with this part. (B) The covered entity is responsible for complying with § 164.316(a) and § 164.530(i), pertaining to the implementation of policies and procedures to ensure compliance with applicable requirements of this part, including the safeguard requirements in paragraph (a)(2)(ii) of this section. (C) The covered entity is responsible for complying with § 164.314 and § 164.504 regarding business associate arrangements and other organizational requirements. (D) The covered entity is responsible for designating the components that are part of one or more health care components of the covered entity and documenting the designation in accordance with paragraph (c) of this section, provided that, if the covered entity designates one or more health care components, it must include any component that would meet the definition of a covered entity or business associate if it were a separate legal entity. Health care component(s) also may include a component only to the extent that it performs covered functions. (b)(1) Standard: Affiliated covered entities. Legally separate covered entities that are affiliated may designate themselves as a single covered entity for purposes of this part. (2) Implementation specifications. (i) Requirements for designation of an affiliated covered entity. (A) Legally separate covered entities may designate themselves (including any health care component of such covered entity) as a single affiliated covered entity, for purposes of this part, if all of the covered entities designated are under common ownership or control. VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 (B) The designation of an affiliated covered entity must be documented and the documentation maintained as required by paragraph (c) of this section. (ii) Safeguard requirements. An affiliated covered entity must ensure that it complies with the applicable requirements of this part, including, if the affiliated covered entity combines the functions of a health plan, health care provider, or health care clearinghouse, § 164.308(a)(4)(ii)(A) and § 164.504(g), as applicable. * * * * * ■ 29. Revise § 164.106 to read as follows: § 164.106 Relationship to other parts. In complying with the requirements of this part, covered entities and, where provided, business associates, are required to comply with the applicable provisions of parts 160 and 162 of this subchapter. ■ 30. The authority citation for subpart C of part 164 is revised to read as follows: Authority: 42 U.S.C. 1320d–2 and 1320d– 4; sec. 13401, Pub. L. 111–5, 123 Stat. 260. 31. Revise § 164.302 to read as follows: ■ § 164.302 Applicability. A covered entity or business associate must comply with the applicable standards, implementation specifications, and requirements of this subpart with respect to electronic protected health information of a covered entity. ■ 32. In § 164.304, revise the definitions of ‘‘Administrative safeguards’’ and ‘‘Physical safeguards’’ to read as follows: § 164.304 Definitions. * * * * * Administrative safeguards are administrative actions, and policies and procedures, to manage the selection, development, implementation, and maintenance of security measures to protect electronic protected health information and to manage the conduct of the covered entity’s or business associate’s workforce in relation to the protection of that information. * * * * * Physical safeguards are physical measures, policies, and procedures to protect a covered entity’s or business associate’s electronic information systems and related buildings and equipment, from natural and environmental hazards, and unauthorized intrusion. * * * * * PO 00000 Frm 00129 Fmt 4701 Sfmt 4700 5693 33. Amend § 164.306 as follows: a. Revise the introductory text of paragraph (a) and paragraph (a)(1); ■ b. Revise paragraph (b)(1), the introductory text of paragraph (b)(2), and paragraphs (b)(2)(i) and (b)(2)(ii); ■ c. Revise paragraph (c); ■ d. Revise paragraph (d)(2), the introductory text of paragraph (d)(3), paragraph (d)(3)(i), and the introductory text of paragraph (d)(3)(ii); and ■ e. Revise paragraph (e). The revisions read as follows: ■ ■ § 164.306 rules. Security standards: General (a) General requirements. Covered entities and business associates must do the following: (1) Ensure the confidentiality, integrity, and availability of all electronic protected health information the covered entity or business associate creates, receives, maintains, or transmits. * * * * * (b) * * * (1) Covered entities and business associates may use any security measures that allow the covered entity or business associate to reasonably and appropriately implement the standards and implementation specifications as specified in this subpart. (2) In deciding which security measures to use, a covered entity or business associate must take into account the following factors: (i) The size, complexity, and capabilities of the covered entity or business associate. (ii) The covered entity’s or the business associate’s technical infrastructure, hardware, and software security capabilities. * * * * * (c) Standards. A covered entity or business associate must comply with the applicable standards as provided in this section and in § 164.308, § 164.310, § 164.312, § 164.314 and § 164.316 with respect to all electronic protected health information. (d) * * * (2) When a standard adopted in § 164.308, § 164.310, § 164.312, § 164.314, or § 164.316 includes required implementation specifications, a covered entity or business associate must implement the implementation specifications. (3) When a standard adopted in § 164.308, § 164.310, § 164.312, § 164.314, or § 164.316 includes addressable implementation specifications, a covered entity or business associate must— (i) Assess whether each implementation specification is a E:\FR\FM\25JAR2.SGM 25JAR2 5694 Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations reasonable and appropriate safeguard in its environment, when analyzed with reference to the likely contribution to protecting electronic protected health information; and (ii) As applicable to the covered entity or business associate— * * * * * (e) Maintenance. A covered entity or business associate must review and modify the security measures implemented under this subpart as needed to continue provision of reasonable and appropriate protection of electronic protected health information, and update documentation of such security measures in accordance with § 164.316(b)(2)(iii). ■ 34. Amend § 164.308 as follows: ■ a. Revise the introductory text of paragraph (a), paragraph (a)(1)(ii)(A), paragraph (a)(1)(ii)(C), paragraph (a)(2), paragraph (a)(3)(ii)(C), paragraph (a)(4)(ii)(C), paragraph (a)(6)(ii), and paragraph (a)(8); and ■ b. Revise paragraph (b). The revisions read as follows: sroberts on DSK5SPTVN1PROD with § 164.308 Administrative safeguards. (a) A covered entity or business associate must, in accordance with § 164.306: (1) * * * (ii) * * * (A) Risk analysis (Required). Conduct an accurate and thorough assessment of the potential risks and vulnerabilities to the confidentiality, integrity, and availability of electronic protected health information held by the covered entity or business associate. * * * * * (C) Sanction policy (Required). Apply appropriate sanctions against workforce members who fail to comply with the security policies and procedures of the covered entity or business associate. * * * * * (2) Standard: Assigned security responsibility. Identify the security official who is responsible for the development and implementation of the policies and procedures required by this subpart for the covered entity or business associate. (3) * * * (ii) * * * (C) Termination procedures (Addressable). Implement procedures for terminating access to electronic protected health information when the employment of, or other arrangement with, a workforce member ends or as required by determinations made as specified in paragraph (a)(3)(ii)(B) of this section. (4) * * * (ii) * * * VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 (C) Access establishment and modification (Addressable). Implement policies and procedures that, based upon the covered entity’s or the business associate’s access authorization policies, establish, document, review, and modify a user’s right of access to a workstation, transaction, program, or process. * * * * * (6) * * * (ii) Implementation specification: Response and reporting (Required). Identify and respond to suspected or known security incidents; mitigate, to the extent practicable, harmful effects of security incidents that are known to the covered entity or business associate; and document security incidents and their outcomes. * * * * * (8) Standard: Evaluation. Perform a periodic technical and nontechnical evaluation, based initially upon the standards implemented under this rule and, subsequently, in response to environmental or operational changes affecting the security of electronic protected health information, that establishes the extent to which a covered entity’s or business associate’s security policies and procedures meet the requirements of this subpart. (b)(1) Business associate contracts and other arrangements. A covered entity may permit a business associate to create, receive, maintain, or transmit electronic protected health information on the covered entity’s behalf only if the covered entity obtains satisfactory assurances, in accordance with § 164.314(a), that the business associate will appropriately safeguard the information. A covered entity is not required to obtain such satisfactory assurances from a business associate that is a subcontractor. (2) A business associate may permit a business associate that is a subcontractor to create, receive, maintain, or transmit electronic protected health information on its behalf only if the business associate obtains satisfactory assurances, in accordance with § 164.314(a), that the subcontractor will appropriately safeguard the information. (3) Implementation specifications: Written contract or other arrangement (Required). Document the satisfactory assurances required by paragraph (b)(1) or (b)(2) of this section through a written contract or other arrangement with the business associate that meets the applicable requirements of § 164.314(a). ■ 35. Revise the introductory text of § 164.310 to read as follows: PO 00000 Frm 00130 Fmt 4701 Sfmt 4700 § 164.310 Physical safeguards. A covered entity or business associate must, in accordance with § 164.306: * * * * * ■ 36. Revise the introductory text of § 164.312 to read as follows: § 164.312 Technical safeguards. A covered entity or business associate must, in accordance with § 164.306: * * * * * ■ 37. Amend § 164.314 by revising paragraphs (a) and (b)(2)(iii) to read as follows: § 164.314 Organizational requirements. (a)(1) Standard: Business associate contracts or other arrangements. The contract or other arrangement required by § 164.308(b)(4) must meet the requirements of paragraph (a)(2)(i), (a)(2)(ii), or (a)(2)(iii) of this section, as applicable. (2) Implementation specifications (Required). (i) Business associate contracts. The contract must provide that the business associate will— (A) Comply with the applicable requirements of this subpart; (B) In accordance with § 164.308(b)(2), ensure that any subcontractors that create, receive, maintain, or transmit electronic protected health information on behalf of the business associate agree to comply with the applicable requirements of this subpart by entering into a contract or other arrangement that complies with this section; and (C) Report to the covered entity any security incident of which it becomes aware, including breaches of unsecured protected health information as required by § 164.410. (ii) Other arrangements. The covered entity is in compliance with paragraph (a)(1) of this section if it has another arrangement in place that meets the requirements of § 164.504(e)(3). (iii) Business associate contracts with subcontractors. The requirements of paragraphs (a)(2)(i) and (a)(2)(ii) of this section apply to the contract or other arrangement between a business associate and a subcontractor required by § 164.308(b)(4) in the same manner as such requirements apply to contracts or other arrangements between a covered entity and business associate. (b) * * * (2) * * * (iii) Ensure that any agent to whom it provides this information agrees to implement reasonable and appropriate security measures to protect the information; and * * * * * E:\FR\FM\25JAR2.SGM 25JAR2 Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations 38. Revise the introductory text of § 164.316 and the third sentence of paragraph (a) to read as follows: ■ § 164.316 Policies and procedures and documentation requirements. A covered entity or business associate must, in accordance with § 164.306: (a) * * * A covered entity or business associate may change its policies and procedures at any time, provided that the changes are documented and are implemented in accordance with this subpart. * * * * * ■ 39. Revise § 164.402 to read as follows: sroberts on DSK5SPTVN1PROD with § 164.402 Definitions. As used in this subpart, the following terms have the following meanings: Breach means the acquisition, access, use, or disclosure of protected health information in a manner not permitted under subpart E of this part which compromises the security or privacy of the protected health information. (1) Breach excludes: (i) Any unintentional acquisition, access, or use of protected health information by a workforce member or person acting under the authority of a covered entity or a business associate, if such acquisition, access, or use was made in good faith and within the scope of authority and does not result in further use or disclosure in a manner not permitted under subpart E of this part. (ii) Any inadvertent disclosure by a person who is authorized to access protected health information at a covered entity or business associate to another person authorized to access protected health information at the same covered entity or business associate, or organized health care arrangement in which the covered entity participates, and the information received as a result of such disclosure is not further used or disclosed in a manner not permitted under subpart E of this part. (iii) A disclosure of protected health information where a covered entity or business associate has a good faith belief that an unauthorized person to whom the disclosure was made would not reasonably have been able to retain such information. (2) Except as provided in paragraph (1) of this definition, an acquisition, access, use, or disclosure of protected health information in a manner not permitted under subpart E is presumed to be a breach unless the covered entity or business associate, as applicable, demonstrates that there is a low probability that the protected health information has been compromised VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 based on a risk assessment of at least the following factors: (i) The nature and extent of the protected health information involved, including the types of identifiers and the likelihood of re-identification; (ii) The unauthorized person who used the protected health information or to whom the disclosure was made; (iii) Whether the protected health information was actually acquired or viewed; and (iv) The extent to which the risk to the protected health information has been mitigated. Unsecured protected health information means protected health information that is not rendered unusable, unreadable, or indecipherable to unauthorized persons through the use of a technology or methodology specified by the Secretary in the guidance issued under section 13402(h)(2) of Public Law 111–5. ■ 40. In § 164.406, revise paragraph (a) to read as follows: § 164.406 Notification to the media. (a) Standard. For a breach of unsecured protected health information involving more than 500 residents of a State or jurisdiction, a covered entity shall, following the discovery of the breach as provided in § 164.404(a)(2), notify prominent media outlets serving the State or jurisdiction. * * * * * ■ 41. In § 164.408, revise paragraph (c) to read as follows: § 164.408 Notification to the Secretary. * * * * * (c) Implementation specifications: Breaches involving less than 500 individuals. For breaches of unsecured protected health information involving less than 500 individuals, a covered entity shall maintain a log or other documentation of such breaches and, not later than 60 days after the end of each calendar year, provide the notification required by paragraph (a) of this section for breaches discovered during the preceding calendar year, in the manner specified on the HHS web site. ■ 42. In § 164.410, revise paragraph (a) to read as follows: § 164.410 Notification by a business associate. (a) Standard—(1) General rule. A business associate shall, following the discovery of a breach of unsecured protected health information, notify the covered entity of such breach. (2) Breaches treated as discovered. For purposes of paragraph (a)(1) of this section, a breach shall be treated as PO 00000 Frm 00131 Fmt 4701 Sfmt 4700 5695 discovered by a business associate as of the first day on which such breach is known to the business associate or, by exercising reasonable diligence, would have been known to the business associate. A business associate shall be deemed to have knowledge of a breach if the breach is known, or by exercising reasonable diligence would have been known, to any person, other than the person committing the breach, who is an employee, officer, or other agent of the business associate (determined in accordance with the Federal common law of agency). * * * * * ■ 43. The authority citation for subpart E of part 164 is revised to read as follows: Authority: 42 U.S.C. 1320d–2, 1320d–4, and 1320d–9; sec. 264 of Pub. L. 104–191, 110 Stat. 2033–2034 (42 U.S.C. 1320d–2 (note)); and secs. 13400–13424, Pub. L. 111– 5, 123 Stat. 258–279. 44. In § 164.500, redesignate paragraph (c) as paragraph (d) and add new paragraph (c) to read as follows: ■ § 164.500 Applicability. * * * * * (c) Where provided, the standards, requirements, and implementation specifications adopted under this subpart apply to a business associate with respect to the protected health information of a covered entity. * * * * * ■ 45. Amend § 164.501 as follows: ■ a. Revise paragraphs (1) and (3) of the definition of ‘‘Health care operations’’; ■ b. Revise the definition of ‘‘Marketing’’; and ■ c. Revise paragraph (1)(i) of the definition of ‘‘Payment’’. The revisions read as follows: § 164.501 Definitions. * * * * * Health care operations means * * * (1) Conducting quality assessment and improvement activities, including outcomes evaluation and development of clinical guidelines, provided that the obtaining of generalizable knowledge is not the primary purpose of any studies resulting from such activities; patient safety activities (as defined in 42 CFR 3.20); population-based activities relating to improving health or reducing health care costs, protocol development, case management and care coordination, contacting of health care providers and patients with information about treatment alternatives; and related functions that do not include treatment; * * * * * (3) Except as prohibited under § 164.502(a)(5)(i), underwriting, E:\FR\FM\25JAR2.SGM 25JAR2 sroberts on DSK5SPTVN1PROD with 5696 Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations enrollment, premium rating, and other activities related to the creation, renewal, or replacement of a contract of health insurance or health benefits, and ceding, securing, or placing a contract for reinsurance of risk relating to claims for health care (including stop-loss insurance and excess of loss insurance), provided that the requirements of § 164.514(g) are met, if applicable; * * * * * Marketing: (1) Except as provided in paragraph (2) of this definition, marketing means to make a communication about a product or service that encourages recipients of the communication to purchase or use the product or service. (2) Marketing does not include a communication made: (i) To provide refill reminders or otherwise communicate about a drug or biologic that is currently being prescribed for the individual, only if any financial remuneration received by the covered entity in exchange for making the communication is reasonably related to the covered entity’s cost of making the communication. (ii) For the following treatment and health care operations purposes, except where the covered entity receives financial remuneration in exchange for making the communication: (A) For treatment of an individual by a health care provider, including case management or care coordination for the individual, or to direct or recommend alternative treatments, therapies, health care providers, or settings of care to the individual; (B) To describe a health-related product or service (or payment for such product or service) that is provided by, or included in a plan of benefits of, the covered entity making the communication, including communications about: the entities participating in a health care provider network or health plan network; replacement of, or enhancements to, a health plan; and health-related products or services available only to a health plan enrollee that add value to, but are not part of, a plan of benefits; or (C) For case management or care coordination, contacting of individuals with information about treatment alternatives, and related functions to the extent these activities do not fall within the definition of treatment. (3) Financial remuneration means direct or indirect payment from or on behalf of a third party whose product or service is being described. Direct or indirect payment does not include any payment for treatment of an individual. VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 Payment means: (1) * * * (i) Except as prohibited under § 164.502(a)(5)(i), a health plan to obtain premiums or to determine or fulfill its responsibility for coverage and provision of benefits under the health plan; or * * * * * ■ 46. In § 164.502, revise paragraphs (a), (b)(1), (e), and (f) to read as follows: § 164.502 Uses and disclosures of protected health information: General rules. (a) Standard. A covered entity or business associate may not use or disclose protected health information, except as permitted or required by this subpart or by subpart C of part 160 of this subchapter. (1) Covered entities: Permitted uses and disclosures. A covered entity is permitted to use or disclose protected health information as follows: (i) To the individual; (ii) For treatment, payment, or health care operations, as permitted by and in compliance with § 164.506; (iii) Incident to a use or disclosure otherwise permitted or required by this subpart, provided that the covered entity has complied with the applicable requirements of §§ 164.502(b), 164.514(d), and 164.530(c) with respect to such otherwise permitted or required use or disclosure; (iv) Except for uses and disclosures prohibited under § 164.502(a)(5)(i), pursuant to and in compliance with a valid authorization under § 164.508; (v) Pursuant to an agreement under, or as otherwise permitted by, § 164.510; and (vi) As permitted by and in compliance with this section, § 164.512, § 164.514(e), (f), or (g). (2) Covered entities: Required disclosures. A covered entity is required to disclose protected health information: (i) To an individual, when requested under, and required by § 164.524 or § 164.528; and (ii) When required by the Secretary under subpart C of part 160 of this subchapter to investigate or determine the covered entity’s compliance with this subchapter. (3) Business associates: Permitted uses and disclosures. A business associate may use or disclose protected health information only as permitted or required by its business associate contract or other arrangement pursuant to § 164.504(e) or as required by law. The business associate may not use or disclose protected health information in a manner that would violate the requirements of this subpart, if done by the covered entity, except for the PO 00000 Frm 00132 Fmt 4701 Sfmt 4700 purposes specified under § 164.504(e)(2)(i)(A) or (B) if such uses or disclosures are permitted by its contract or other arrangement. (4) Business associates: Required uses and disclosures. A business associate is required to disclose protected health information: (i) When required by the Secretary under subpart C of part 160 of this subchapter to investigate or determine the business associate’s compliance with this subchapter. (ii) To the covered entity, individual, or individual’s designee, as necessary to satisfy a covered entity’s obligations under § 164.524(c)(2)(ii) and (3)(ii) with respect to an individual’s request for an electronic copy of protected health information. (5) Prohibited uses and disclosures. (i) Use and disclosure of genetic information for underwriting purposes: Notwithstanding any other provision of this subpart, a health plan, excluding an issuer of a long-term care policy falling within paragraph (1)(viii) of the definition of health plan, shall not use or disclose protected health information that is genetic information for underwriting purposes. For purposes of paragraph (a)(5)(i) of this section, underwriting purposes means, with respect to a health plan: (A) Except as provided in paragraph (a)(5)(i)(B) of this section: (1) Rules for, or determination of, eligibility (including enrollment and continued eligibility) for, or determination of, benefits under the plan, coverage, or policy (including changes in deductibles or other costsharing mechanisms in return for activities such as completing a health risk assessment or participating in a wellness program); (2) The computation of premium or contribution amounts under the plan, coverage, or policy (including discounts, rebates, payments in kind, or other premium differential mechanisms in return for activities such as completing a health risk assessment or participating in a wellness program); (3) The application of any pre-existing condition exclusion under the plan, coverage, or policy; and (4) Other activities related to the creation, renewal, or replacement of a contract of health insurance or health benefits. (B) Underwriting purposes does not include determinations of medical appropriateness where an individual seeks a benefit under the plan, coverage, or policy. (ii) Sale of protected health information: E:\FR\FM\25JAR2.SGM 25JAR2 sroberts on DSK5SPTVN1PROD with Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations (A) Except pursuant to and in compliance with § 164.508(a)(4), a covered entity or business associate may not sell protected health information. (B) For purposes of this paragraph, sale of protected health information means: (1) Except as provided in paragraph (a)(5)(ii)(B)(2) of this section, a disclosure of protected health information by a covered entity or business associate, if applicable, where the covered entity or business associate directly or indirectly receives remuneration from or on behalf of the recipient of the protected health information in exchange for the protected health information. (2) Sale of protected health information does not include a disclosure of protected health information: (i) For public health purposes pursuant to § 164.512(b) or § 164.514(e); (ii) For research purposes pursuant to § 164.512(i) or § 164.514(e), where the only remuneration received by the covered entity or business associate is a reasonable cost-based fee to cover the cost to prepare and transmit the protected health information for such purposes; (iii) For treatment and payment purposes pursuant to § 164.506(a); (iv) For the sale, transfer, merger, or consolidation of all or part of the covered entity and for related due diligence as described in paragraph (6)(iv) of the definition of health care operations and pursuant to § 164.506(a); (v) To or by a business associate for activities that the business associate undertakes on behalf of a covered entity, or on behalf of a business associate in the case of a subcontractor, pursuant to §§ 164.502(e) and 164.504(e), and the only remuneration provided is by the covered entity to the business associate, or by the business associate to the subcontractor, if applicable, for the performance of such activities; (vi) To an individual, when requested under § 164.524 or § 164.528; (vii) Required by law as permitted under § 164.512(a); and (viii) For any other purpose permitted by and in accordance with the applicable requirements of this subpart, where the only remuneration received by the covered entity or business associate is a reasonable, cost-based fee to cover the cost to prepare and transmit the protected health information for such purpose or a fee otherwise expressly permitted by other law. (b) * * * (1) Minimum necessary applies. When using or disclosing protected health information or when requesting VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 protected health information from another covered entity or business associate, a covered entity or business associate must make reasonable efforts to limit protected health information to the minimum necessary to accomplish the intended purpose of the use, disclosure, or request. * * * * * (e)(1) Standard: Disclosures to business associates. (i) A covered entity may disclose protected health information to a business associate and may allow a business associate to create, receive, maintain, or transmit protected health information on its behalf, if the covered entity obtains satisfactory assurance that the business associate will appropriately safeguard the information. A covered entity is not required to obtain such satisfactory assurances from a business associate that is a subcontractor. (ii) A business associate may disclose protected health information to a business associate that is a subcontractor and may allow the subcontractor to create, receive, maintain, or transmit protected health information on its behalf, if the business associate obtains satisfactory assurances, in accordance with § 164.504(e)(1)(i), that the subcontractor will appropriately safeguard the information. (2) Implementation specification: Documentation. The satisfactory assurances required by paragraph (e)(1) of this section must be documented through a written contract or other written agreement or arrangement with the business associate that meets the applicable requirements of § 164.504(e). (f) Standard: Deceased individuals. A covered entity must comply with the requirements of this subpart with respect to the protected health information of a deceased individual for a period of 50 years following the death of the individual. * * * * * ■ 47. In § 164.504, revise paragraphs (e), (f)(1)(ii) introductory text, and (f)(2)(ii)(B) to read as follows: § 164.504 Uses and disclosures: Organizational requirements. * * * * * (e)(1) Standard: Business associate contracts. (i) The contract or other arrangement required by § 164.502(e)(2) must meet the requirements of paragraph (e)(2), (e)(3), or (e)(5) of this section, as applicable. (ii) A covered entity is not in compliance with the standards in § 164.502(e) and this paragraph, if the covered entity knew of a pattern of PO 00000 Frm 00133 Fmt 4701 Sfmt 4700 5697 activity or practice of the business associate that constituted a material breach or violation of the business associate’s obligation under the contract or other arrangement, unless the covered entity took reasonable steps to cure the breach or end the violation, as applicable, and, if such steps were unsuccessful, terminated the contract or arrangement, if feasible. (iii) A business associate is not in compliance with the standards in § 164.502(e) and this paragraph, if the business associate knew of a pattern of activity or practice of a subcontractor that constituted a material breach or violation of the subcontractor’s obligation under the contract or other arrangement, unless the business associate took reasonable steps to cure the breach or end the violation, as applicable, and, if such steps were unsuccessful, terminated the contract or arrangement, if feasible. (2) Implementation specifications: Business associate contracts. A contract between the covered entity and a business associate must: (i) Establish the permitted and required uses and disclosures of protected health information by the business associate. The contract may not authorize the business associate to use or further disclose the information in a manner that would violate the requirements of this subpart, if done by the covered entity, except that: (A) The contract may permit the business associate to use and disclose protected health information for the proper management and administration of the business associate, as provided in paragraph (e)(4) of this section; and (B) The contract may permit the business associate to provide data aggregation services relating to the health care operations of the covered entity. (ii) Provide that the business associate will: (A) Not use or further disclose the information other than as permitted or required by the contract or as required by law; (B) Use appropriate safeguards and comply, where applicable, with subpart C of this part with respect to electronic protected health information, to prevent use or disclosure of the information other than as provided for by its contract; (C) Report to the covered entity any use or disclosure of the information not provided for by its contract of which it becomes aware, including breaches of unsecured protected health information as required by § 164.410; (D) In accordance with § 164.502(e)(1)(ii), ensure that any E:\FR\FM\25JAR2.SGM 25JAR2 sroberts on DSK5SPTVN1PROD with 5698 Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations subcontractors that create, receive, maintain, or transmit protected health information on behalf of the business associate agree to the same restrictions and conditions that apply to the business associate with respect to such information; (E) Make available protected health information in accordance with § 164.524; (F) Make available protected health information for amendment and incorporate any amendments to protected health information in accordance with § 164.526; (G) Make available the information required to provide an accounting of disclosures in accordance with § 164.528; (H) To the extent the business associate is to carry out a covered entity’s obligation under this subpart, comply with the requirements of this subpart that apply to the covered entity in the performance of such obligation. (I) Make its internal practices, books, and records relating to the use and disclosure of protected health information received from, or created or received by the business associate on behalf of, the covered entity available to the Secretary for purposes of determining the covered entity’s compliance with this subpart; and (J) At termination of the contract, if feasible, return or destroy all protected health information received from, or created or received by the business associate on behalf of, the covered entity that the business associate still maintains in any form and retain no copies of such information or, if such return or destruction is not feasible, extend the protections of the contract to the information and limit further uses and disclosures to those purposes that make the return or destruction of the information infeasible. (iii) Authorize termination of the contract by the covered entity, if the covered entity determines that the business associate has violated a material term of the contract. (3) Implementation specifications: Other arrangements. (i) If a covered entity and its business associate are both governmental entities: (A) The covered entity may comply with this paragraph and § 164.314(a)(1), if applicable, by entering into a memorandum of understanding with the business associate that contains terms that accomplish the objectives of paragraph (e)(2) of this section and § 164.314(a)(2), if applicable. (B) The covered entity may comply with this paragraph and § 164.314(a)(1), if applicable, if other law (including regulations adopted by the covered VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 entity or its business associate) contains requirements applicable to the business associate that accomplish the objectives of paragraph (e)(2) of this section and § 164.314(a)(2), if applicable. (ii) If a business associate is required by law to perform a function or activity on behalf of a covered entity or to provide a service described in the definition of business associate in § 160.103 of this subchapter to a covered entity, such covered entity may disclose protected health information to the business associate to the extent necessary to comply with the legal mandate without meeting the requirements of this paragraph and § 164.314(a)(1), if applicable, provided that the covered entity attempts in good faith to obtain satisfactory assurances as required by paragraph (e)(2) of this section and § 164.314(a)(1), if applicable, and, if such attempt fails, documents the attempt and the reasons that such assurances cannot be obtained. (iii) The covered entity may omit from its other arrangements the termination authorization required by paragraph (e)(2)(iii) of this section, if such authorization is inconsistent with the statutory obligations of the covered entity or its business associate. (iv) A covered entity may comply with this paragraph and § 164.314(a)(1) if the covered entity discloses only a limited data set to a business associate for the business associate to carry out a health care operations function and the covered entity has a data use agreement with the business associate that complies with § 164.514(e)(4) and § 164.314(a)(1), if applicable. (4) Implementation specifications: Other requirements for contracts and other arrangements. (i) The contract or other arrangement between the covered entity and the business associate may permit the business associate to use the protected health information received by the business associate in its capacity as a business associate to the covered entity, if necessary: (A) For the proper management and administration of the business associate; or (B) To carry out the legal responsibilities of the business associate. (ii) The contract or other arrangement between the covered entity and the business associate may permit the business associate to disclose the protected health information received by the business associate in its capacity as a business associate for the purposes described in paragraph (e)(4)(i) of this section, if: PO 00000 Frm 00134 Fmt 4701 Sfmt 4700 (A) The disclosure is required by law; or (B)(1) The business associate obtains reasonable assurances from the person to whom the information is disclosed that it will be held confidentially and used or further disclosed only as required by law or for the purposes for which it was disclosed to the person; and (2) The person notifies the business associate of any instances of which it is aware in which the confidentiality of the information has been breached. (5) Implementation specifications: Business associate contracts with subcontractors. The requirements of § 164.504(e)(2) through (e)(4) apply to the contract or other arrangement required by § 164.502(e)(1)(ii) between a business associate and a business associate that is a subcontractor in the same manner as such requirements apply to contracts or other arrangements between a covered entity and business associate. (f)(1)* * * (ii) Except as prohibited by § 164.502(a)(5)(i), the group health plan, or a health insurance issuer or HMO with respect to the group health plan, may disclose summary health information to the plan sponsor, if the plan sponsor requests the summary health information for purposes of: * * * * * (2) * * * (ii) * * * (B) Ensure that any agents to whom it provides protected health information received from the group health plan agree to the same restrictions and conditions that apply to the plan sponsor with respect to such information; * * * * * ■ 48. In § 164.506, revise paragraphs (a) and (c)(5) to read as follows: § 164.506 Uses and disclosures to carry out treatment, payment, or health care operations. (a) Standard: Permitted uses and disclosures. Except with respect to uses or disclosures that require an authorization under § 164.508(a)(2) through (4) or that are prohibited under § 164.502(a)(5)(i), a covered entity may use or disclose protected health information for treatment, payment, or health care operations as set forth in paragraph (c) of this section, provided that such use or disclosure is consistent with other applicable requirements of this subpart. * * * * * (c) * * * (5) A covered entity that participates in an organized health care arrangement E:\FR\FM\25JAR2.SGM 25JAR2 Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations may disclose protected health information about an individual to other participants in the organized health care arrangement for any health care operations activities of the organized health care arrangement. ■ 49. Amend § 164.508 as follows: ■ a. Revise the headings of paragraphs (a), (a)(1), and (a)(2); ■ b. Revise paragraph (a)(3)(ii); ■ c. Add new paragraph (a)(4); and ■ d. Revise paragraphs (b)(1)(i), and (b)(3). The revisions and additions read as follows: sroberts on DSK5SPTVN1PROD with § 164.508 Uses and disclosures for which an authorization is required. (a) Standard: Authorizations for uses and disclosures—(1) Authorization required: General rule. * * * (2) Authorization required: Psychotherapy notes. * * * (3) * * * (ii) If the marketing involves financial remuneration, as defined in paragraph (3) of the definition of marketing at § 164.501, to the covered entity from a third party, the authorization must state that such remuneration is involved. (4) Authorization required: Sale of protected health information. (i) Notwithstanding any provision of this subpart, other than the transition provisions in § 164.532, a covered entity must obtain an authorization for any disclosure of protected health information which is a sale of protected health information, as defined in § 164.501 of this subpart. (ii) Such authorization must state that the disclosure will result in remuneration to the covered entity. (b) * * * (1) * * * (i) A valid authorization is a document that meets the requirements in paragraphs (a)(3)(ii), (a)(4)(ii), (c)(1), and (c)(2) of this section, as applicable. * * * * * (3) Compound authorizations. An authorization for use or disclosure of protected health information may not be combined with any other document to create a compound authorization, except as follows: (i) An authorization for the use or disclosure of protected health information for a research study may be combined with any other type of written permission for the same or another research study. This exception includes combining an authorization for the use or disclosure of protected health information for a research study with another authorization for the same research study, with an authorization for the creation or maintenance of a research database or repository, or with VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 a consent to participate in research. Where a covered health care provider has conditioned the provision of research-related treatment on the provision of one of the authorizations, as permitted under paragraph (b)(4)(i) of this section, any compound authorization created under this paragraph must clearly differentiate between the conditioned and unconditioned components and provide the individual with an opportunity to opt in to the research activities described in the unconditioned authorization. (ii) An authorization for a use or disclosure of psychotherapy notes may only be combined with another authorization for a use or disclosure of psychotherapy notes. (iii) An authorization under this section, other than an authorization for a use or disclosure of psychotherapy notes, may be combined with any other such authorization under this section, except when a covered entity has conditioned the provision of treatment, payment, enrollment in the health plan, or eligibility for benefits under paragraph (b)(4) of this section on the provision of one of the authorizations. The prohibition in this paragraph on combining authorizations where one authorization conditions the provision of treatment, payment, enrollment in a health plan, or eligibility for benefits under paragraph (b)(4) of this section does not apply to a compound authorization created in accordance with paragraph (b)(3)(i) of this section. * * * * * ■ 50. Amend § 164.510 as follows: ■ a. Revise paragraph (a)(1)(ii) introductory text; ■ b. Revise paragraph (b)(1)(i), the second sentence of paragraph (b)(1)(ii), paragraph (b)(2)(iii), the first sentence of paragraph (b)(3), and paragraph (b)(4); and ■ c. Add new paragraph (b)(5). The revisions and additions read as follows: § 164.510 Uses and disclosures requiring an opportunity for the individual to agree or to object. * * * * * (a) * * * (1) * * * (ii) Use or disclose for directory purposes such information: * * * * * (b) * * * (1) * * * (i) A covered entity may, in accordance with paragraphs (b)(2), (b)(3), or (b)(5) of this section, disclose to a family member, other relative, or a PO 00000 Frm 00135 Fmt 4701 Sfmt 4700 5699 close personal friend of the individual, or any other person identified by the individual, the protected health information directly relevant to such person’s involvement with the individual’s health care or payment related to the individual’s health care. (ii) * * * Any such use or disclosure of protected health information for such notification purposes must be in accordance with paragraphs (b)(2), (b)(3), (b)(4), or (b)(5) of this section, as applicable. * * * * * (2) * * * (iii) Reasonably infers from the circumstances, based on the exercise of professional judgment, that the individual does not object to the disclosure. (3) * * * If the individual is not present, or the opportunity to agree or object to the use or disclosure cannot practicably be provided because of the individual’s incapacity or an emergency circumstance, the covered entity may, in the exercise of professional judgment, determine whether the disclosure is in the best interests of the individual and, if so, disclose only the protected health information that is directly relevant to the person’s involvement with the individual’s care or payment related to the individual’s health care or needed for notification purposes. * * * (4) Uses and disclosures for disaster relief purposes. A covered entity may use or disclose protected health information to a public or private entity authorized by law or by its charter to assist in disaster relief efforts, for the purpose of coordinating with such entities the uses or disclosures permitted by paragraph (b)(1)(ii) of this section. The requirements in paragraphs (b)(2), (b)(3), or (b)(5) of this section apply to such uses and disclosures to the extent that the covered entity, in the exercise of professional judgment, determines that the requirements do not interfere with the ability to respond to the emergency circumstances. (5) Uses and disclosures when the individual is deceased. If the individual is deceased, a covered entity may disclose to a family member, or other persons identified in paragraph (b)(1) of this section who were involved in the individual’s care or payment for health care prior to the individual’s death, protected health information of the individual that is relevant to such person’s involvement, unless doing so is inconsistent with any prior expressed preference of the individual that is known to the covered entity. ■ 51. Amend § 164.512 as follows: ■ a. Revise the paragraph heading for paragraph (b), the introductory text of E:\FR\FM\25JAR2.SGM 25JAR2 5700 Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations paragraph (b)(1) and the introductory text of paragraph (b)(1)(v)(A); ■ b. Add new paragraph (b)(1)(vi); ■ c. Revise the introductory text of paragraph (e)(1)(iii) and paragraph (e)(1)(vi); ■ d. Revise paragraph (i)(2)(iii); and ■ e. Revise paragraphs (k)(1)(ii), (k)(3), and (k)(5)(i)(E). The revisions and additions read as follows: § 164.512 Uses and disclosures for which an authorization or opportunity to agree or object is not required. sroberts on DSK5SPTVN1PROD with * * * * * (b) Standard: Uses and disclosures for public health activities. (1) Permitted uses and disclosures. A covered entity may use or disclose protected health information for the public health activities and purposes described in this paragraph to: * * * * * (v) * * * (A) The covered entity is a covered health care provider who provides health care to the individual at the request of the employer: * * * * * (vi) A school, about an individual who is a student or prospective student of the school, if: (A) The protected health information that is disclosed is limited to proof of immunization; (B) The school is required by State or other law to have such proof of immunization prior to admitting the individual; and (C) The covered entity obtains and documents the agreement to the disclosure from either: (1) A parent, guardian, or other person acting in loco parentis of the individual, if the individual is an unemancipated minor; or (2) The individual, if the individual is an adult or emancipated minor. * * * * * (e) * * * (1) * * * (iii) For the purposes of paragraph (e)(1)(ii)(A) of this section, a covered entity receives satisfactory assurances from a party seeking protected health information if the covered entity receives from such party a written statement and accompanying documentation demonstrating that: * * * * * (vi) Notwithstanding paragraph (e)(1)(ii) of this section, a covered entity may disclose protected health information in response to lawful process described in paragraph (e)(1)(ii) of this section without receiving satisfactory assurance under paragraph VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 (e)(1)(ii)(A) or (B) of this section, if the covered entity makes reasonable efforts to provide notice to the individual sufficient to meet the requirements of paragraph (e)(1)(iii) of this section or to seek a qualified protective order sufficient to meet the requirements of paragraph (e)(1)(v) of this section. * * * * * (i) * * * (2) * * * (iii) Protected health information needed. A brief description of the protected health information for which use or access has been determined to be necessary by the institutional review board or privacy board, pursuant to paragraph (i)(2)(ii)(C) of this section; * * * * * (k) * * * (1) * * * (ii) Separation or discharge from military service. A covered entity that is a component of the Departments of Defense or Homeland Security may disclose to the Department of Veterans Affairs (DVA) the protected health information of an individual who is a member of the Armed Forces upon the separation or discharge of the individual from military service for the purpose of a determination by DVA of the individual’s eligibility for or entitlement to benefits under laws administered by the Secretary of Veterans Affairs. * * * * * (3) Protective services for the President and others. A covered entity may disclose protected health information to authorized Federal officials for the provision of protective services to the President or other persons authorized by 18 U.S.C. 3056 or to foreign heads of state or other persons authorized by 22 U.S.C. 2709(a)(3), or for the conduct of investigations authorized by 18 U.S.C. 871 and 879. * * * * * (5) * * * (i) * * * (E) Law enforcement on the premises of the correctional institution; or * * * * * ■ 52. In § 164.514, revise paragraphs (e)(4)(ii)(C)(4), (f), and (g) to read as follows: § 164.514 Other requirements relating to uses and disclosures of protected health information. * * * * * (e) * * * (4) * * * (ii) * * * (C) * * * (4) Ensure that any agents to whom it provides the limited data set agree to the same restrictions and conditions that PO 00000 Frm 00136 Fmt 4701 Sfmt 4700 apply to the limited data set recipient with respect to such information; and * * * * * (f) Fundraising communications. (1) Standard: Uses and disclosures for fundraising. Subject to the conditions of paragraph (f)(2) of this section, a covered entity may use, or disclose to a business associate or to an institutionally related foundation, the following protected health information for the purpose of raising funds for its own benefit, without an authorization meeting the requirements of § 164.508: (i) Demographic information relating to an individual, including name, address, other contact information, age, gender, and date of birth; (ii) Dates of health care provided to an individual; (iii) Department of service information; (iv) Treating physician; (v) Outcome information; and (vi) Health insurance status. (2) Implementation specifications: Fundraising requirements. (i) A covered entity may not use or disclose protected health information for fundraising purposes as otherwise permitted by paragraph (f)(1) of this section unless a statement required by § 164.520(b)(1)(iii)(A) is included in the covered entity’s notice of privacy practices. (ii) With each fundraising communication made to an individual under this paragraph, a covered entity must provide the individual with a clear and conspicuous opportunity to elect not to receive any further fundraising communications. The method for an individual to elect not to receive further fundraising communications may not cause the individual to incur an undue burden or more than a nominal cost. (iii) A covered entity may not condition treatment or payment on the individual’s choice with respect to the receipt of fundraising communications. (iv) A covered entity may not make fundraising communications to an individual under this paragraph where the individual has elected not to receive such communications under paragraph (f)(1)(ii)(B) of this section. (v) A covered entity may provide an individual who has elected not to receive further fundraising communications with a method to opt back in to receive such communications. (g) Standard: uses and disclosures for underwriting and related purposes. If a health plan receives protected health information for the purpose of underwriting, premium rating, or other activities relating to the creation, E:\FR\FM\25JAR2.SGM 25JAR2 Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations renewal, or replacement of a contract of health insurance or health benefits, and if such health insurance or health benefits are not placed with the health plan, such health plan may only use or disclose such protected health information for such purpose or as may be required by law, subject to the prohibition at § 164.502(a)(5)(i) with respect to genetic information included in the protected health information. * * * * * ■ 53. Amend § 164.520: ■ a. Revise paragraphs (b)(1)(ii)(E), (b)(1)(iii), (b)(1)(iv)(A), (b)(1)(v)(A), (c)(1)(i) introductory text, and (c)(1)(i)(B); ■ b. Remove paragraph (c)(1)(i)(C); and ■ c. Add paragraph (c)(1)(v). The revisions and addition read as follows: § 164.520 Notice of privacy practices for protected health information. sroberts on DSK5SPTVN1PROD with * * * * * (b) * * * (1) * * * (ii) * * * (E) A description of the types of uses and disclosures that require an authorization under § 164.508(a)(2)– (a)(4), a statement that other uses and disclosures not described in the notice will be made only with the individual’s written authorization, and a statement that the individual may revoke an authorization as provided by § 164.508(b)(5). (iii) Separate statements for certain uses or disclosures. If the covered entity intends to engage in any of the following activities, the description required by paragraph (b)(1)(ii)(A) of this section must include a separate statement informing the individual of such activities, as applicable: (A) In accordance with § 164.514(f)(1), the covered entity may contact the individual to raise funds for the covered entity and the individual has a right to opt out of receiving such communications; (B) In accordance with § 164.504(f), the group health plan, or a health insurance issuer or HMO with respect to a group health plan, may disclose protected health information to the sponsor of the plan; or (C) If a covered entity that is a health plan, excluding an issuer of a long-term care policy falling within paragraph (1)(viii) of the definition of health plan, intends to use or disclose protected health information for underwriting purposes, a statement that the covered entity is prohibited from using or disclosing protected health information that is genetic information of an individual for such purposes. (iv) * * * VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 (A) The right to request restrictions on certain uses and disclosures of protected health information as provided by § 164.522(a), including a statement that the covered entity is not required to agree to a requested restriction, except in case of a disclosure restricted under § 164.522(a)(1)(vi); * * * * * (v) * * * (A) A statement that the covered entity is required by law to maintain the privacy of protected health information, to provide individuals with notice of its legal duties and privacy practices with respect to protected health information, and to notify affected individuals following a breach of unsecured protected health information; * * * * * (c) * * * (1) * * * (i) A health plan must provide the notice: * * * * * (B) Thereafter, at the time of enrollment, to individuals who are new enrollees. * * * * * (v) If there is a material change to the notice: (A) A health plan that posts its notice on its web site in accordance with paragraph (c)(3)(i) of this section must prominently post the change or its revised notice on its web site by the effective date of the material change to the notice, and provide the revised notice, or information about the material change and how to obtain the revised notice, in its next annual mailing to individuals then covered by the plan. (B) A health plan that does not post its notice on a web site pursuant to paragraph (c)(3)(i) of this section must provide the revised notice, or information about the material change and how to obtain the revised notice, to individuals then covered by the plan within 60 days of the material revision to the notice. * * * * * ■ 54. Amend § 164.522 as follows: ■ a. Revise paragraph (a)(1)(ii); ■ b. Add new paragraph (a)(1)(vi); and ■ c. Revise the introductory text of paragraph (a)(2), and paragraphs (a)(2)(iii), and paragraph (a)(3). The revisions and additions read as follows: § 164.522 Rights to request privacy protection for protected health information. (a)(1) * * * (ii) Except as provided in paragraph (a)(1)(vi) of this section, a covered entity is not required to agree to a restriction. * * * * * PO 00000 Frm 00137 Fmt 4701 Sfmt 4700 5701 (vi) A covered entity must agree to the request of an individual to restrict disclosure of protected health information about the individual to a health plan if: (A) The disclosure is for the purpose of carrying out payment or health care operations and is not otherwise required by law; and (B) The protected health information pertains solely to a health care item or service for which the individual, or person other than the health plan on behalf of the individual, has paid the covered entity in full. (2) Implementation specifications: Terminating a restriction. A covered entity may terminate a restriction, if: * * * * * (iii) The covered entity informs the individual that it is terminating its agreement to a restriction, except that such termination is: (A) Not effective for protected health information restricted under paragraph (a)(1)(vi) of this section; and (B) Only effective with respect to protected health information created or received after it has so informed the individual. (3) Implementation specification: Documentation. A covered entity must document a restriction in accordance with § 160.530(j) of this subchapter. * * * * * ■ 55. Amend § 164.524 as follows: ■ a. Remove paragraph (b)(2)(ii) and redesignate paragraph (b)(2)(iii) as paragraph (b)(2)(ii); ■ b. Revise newly designated paragraph (b)(2)(ii); ■ c. Revise paragraph (c)(2)(i); ■ d. Redesignate paragraph (c)(2)(ii) as paragraph (c)(2)(iii); ■ e. Add new paragraph (c)(2)(ii); ■ f. Revise paragraphs (c)(3) and (c)(4)(i); ■ g. Redesignate paragraphs (c)(4)(ii) and (c)(4)(iii) as paragraphs (c)(4)(iii) and (c)(4)(iv), respectively; and ■ h. Add new paragraph (c)(4)(ii). The revisions and additions read as follows: § 164.524 Access of individuals to protected health information. * * * * * (b) * * * (2) * * * (ii) If the covered entity is unable to take an action required by paragraph (b)(2)(i)(A) or (B) of this section within the time required by paragraph (b)(2)(i) of this section, as applicable, the covered entity may extend the time for such actions by no more than 30 days, provided that: (A) The covered entity, within the time limit set by paragraph (b)(2)(i) of E:\FR\FM\25JAR2.SGM 25JAR2 sroberts on DSK5SPTVN1PROD with 5702 Federal Register / Vol. 78, No. 17 / Friday, January 25, 2013 / Rules and Regulations this section, as applicable, provides the individual with a written statement of the reasons for the delay and the date by which the covered entity will complete its action on the request; and (B) The covered entity may have only one such extension of time for action on a request for access. (c) * * * (2) Form of access requested. (i) The covered entity must provide the individual with access to the protected health information in the form and format requested by the individual, if it is readily producible in such form and format; or, if not, in a readable hard copy form or such other form and format as agreed to by the covered entity and the individual. (ii) Notwithstanding paragraph (c)(2)(i) of this section, if the protected health information that is the subject of a request for access is maintained in one or more designated record sets electronically and if the individual requests an electronic copy of such information, the covered entity must provide the individual with access to the protected health information in the electronic form and format requested by the individual, if it is readily producible in such form and format; or, if not, in a readable electronic form and format as agreed to by the covered entity and the individual. * * * * * (3) Time and manner of access. (i) The covered entity must provide the access as requested by the individual in a timely manner as required by paragraph (b)(2) of this section, including arranging with the individual for a convenient time and place to inspect or obtain a copy of the protected health information, or mailing the copy of the protected health information at the individual’s request. The covered entity may discuss the scope, format, and other aspects of the request for access with the individual as necessary to facilitate the timely provision of access. (ii) If an individual’s request for access directs the covered entity to transmit the copy of protected health information directly to another person designated by the individual, the covered entity must provide the copy to the person designated by the individual. The individual’s request must be in writing, signed by the individual, and clearly identify the designated person and where to send the copy of protected health information. (4) * * * VerDate Mar<15>2010 18:57 Jan 24, 2013 Jkt 229001 (i) Labor for copying the protected health information requested by the individual, whether in paper or electronic form; (ii) Supplies for creating the paper copy or electronic media if the individual requests that the electronic copy be provided on portable media; * * * * * ■ 56. In § 164.532, revise paragraphs (a), (c)(2), (c)(3), (d), (e)(1), and (e)(2), and add paragraphs (c)(4) and (f) to read as follows: § 164.532 Transition provisions. (a) Standard: Effect of prior authorizations. Notwithstanding §§ 164.508 and 164.512(i), a covered entity may use or disclose protected health information, consistent with paragraphs (b) and (c) of this section, pursuant to an authorization or other express legal permission obtained from an individual permitting the use or disclosure of protected health information, informed consent of the individual to participate in research, a waiver of informed consent by an IRB, or a waiver of authorization in accordance with § 164.512(i)(1)(i). * * * * * (c) * * * (2) The informed consent of the individual to participate in the research; (3) A waiver, by an IRB, of informed consent for the research, in accordance with 7 CFR 1c.116(d), 10 CFR 745.116(d), 14 CFR 1230.116(d), 15 CFR 27.116(d), 16 CFR 1028.116(d), 21 CFR 50.24, 22 CFR 225.116(d), 24 CFR 60.116(d), 28 CFR 46.116(d), 32 CFR 219.116(d), 34 CFR 97.116(d), 38 CFR 16.116(d), 40 CFR 26.116(d), 45 CFR 46.116(d), 45 CFR 690.116(d), or 49 CFR 11.116(d), provided that a covered entity must obtain authorization in accordance with § 164.508 if, after the compliance date, informed consent is sought from an individual participating in the research; or (4) A waiver of authorization in accordance with § 164.512(i)(1)(i). (d) Standard: Effect of prior contracts or other arrangements with business associates. Notwithstanding any other provisions of this part, a covered entity, or business associate with respect to a subcontractor, may disclose protected health information to a business associate and may allow a business associate to create, receive, maintain, or transmit protected health information on its behalf pursuant to a written contract or other written arrangement with such business associate that does PO 00000 Frm 00138 Fmt 4701 Sfmt 9990 not comply with §§ 164.308(b), 164.314(a), 164.502(e), and 164.504(e), only in accordance with paragraph (e) of this section. (e) Implementation specification: Deemed compliance. (1) Qualification. Notwithstanding other sections of this part, a covered entity, or business associate with respect to a subcontractor, is deemed to be in compliance with the documentation and contract requirements of §§ 164.308(b), 164.314(a), 164.502(e), and 164.504(e), with respect to a particular business associate relationship, for the time period set forth in paragraph (e)(2) of this section, if: (i) Prior to January 25, 2013, such covered entity, or business associate with respect to a subcontractor, has entered into and is operating pursuant to a written contract or other written arrangement with the business associate that complies with the applicable provisions of §§ 164.314(a) or 164.504(e) that were in effect on such date; and (ii) The contract or other arrangement is not renewed or modified from March 26, 2013, until September 23, 2013. (2) Limited deemed compliance period. A prior contract or other arrangement that meets the qualification requirements in paragraph (e) of this section shall be deemed compliant until the earlier of: (i) The date such contract or other arrangement is renewed or modified on or after September 23, 2013; or (ii) September 22, 2014. * * * * * (f) Effect of prior data use agreements. If, prior to [January 25, 2013, a covered entity has entered into and is operating pursuant to a data use agreement with a recipient of a limited data set that complies with § 164.514(e), notwithstanding § 164.502(a)(5)(ii), the covered entity may continue to disclose a limited data set pursuant to such agreement in exchange for remuneration from or on behalf of the recipient of the protected health information until the earlier of: (1) The date such agreement is renewed or modified on or after September 23, 2013; or (2) September 22, 2014. * * * * * Dated: January 15, 2013. Kathleen Sebelius, Secretary. [FR Doc. 2013–01073 Filed 1–17–13; 4:15 pm] BILLING CODE 4153–01–P E:\FR\FM\25JAR2.SGM 25JAR2

Agencies

[Federal Register Volume 78, Number 17 (Friday, January 25, 2013)]
[Rules and Regulations]
[Pages 5565-5702]
From the Federal Register Online via the Government Printing Office [www.gpo.gov]
[FR Doc No: 2013-01073]



[[Page 5565]]

Vol. 78

Friday,

No. 17

January 25, 2013

Part II





Department of Health and Human Services





-----------------------------------------------------------------------





Office of the Secretary





-----------------------------------------------------------------------





45 CFR Parts 160 and 164





Modifications to the HIPAA Privacy, Security, Enforcement, and Breach 
Notification Rules Under the Health Information Technology for Economic 
and Clinical Health Act and the Genetic Information Nondiscrimination 
Act; Other Modifications to the HIPAA Rules; Final Rule

Federal Register / Vol. 78 , No. 17 / Friday, January 25, 2013 / 
Rules and Regulations

[[Page 5566]]


-----------------------------------------------------------------------

DEPARTMENT OF HEALTH AND HUMAN SERVICES

Office of the Secretary

45 CFR Parts 160 and 164

RIN 0945-AA03


Modifications to the HIPAA Privacy, Security, Enforcement, and 
Breach Notification Rules Under the Health Information Technology for 
Economic and Clinical Health Act and the Genetic Information 
Nondiscrimination Act; Other Modifications to the HIPAA Rules

AGENCY: Office for Civil Rights, Department of Health and Human 
Services.

ACTION: Final rule.

-----------------------------------------------------------------------

SUMMARY: The Department of Health and Human Services (HHS or ``the 
Department'') is issuing this final rule to: Modify the Health 
Insurance Portability and Accountability Act (HIPAA) Privacy, Security, 
and Enforcement Rules to implement statutory amendments under the 
Health Information Technology for Economic and Clinical Health Act 
(``the HITECH Act'' or ``the Act'') to strengthen the privacy and 
security protection for individuals' health information; modify the 
rule for Breach Notification for Unsecured Protected Health Information 
(Breach Notification Rule) under the HITECH Act to address public 
comment received on the interim final rule; modify the HIPAA Privacy 
Rule to strengthen the privacy protections for genetic information by 
implementing section 105 of Title I of the Genetic Information 
Nondiscrimination Act of 2008 (GINA); and make certain other 
modifications to the HIPAA Privacy, Security, Breach Notification, and 
Enforcement Rules (the HIPAA Rules) to improve their workability and 
effectiveness and to increase flexibility for and decrease burden on 
the regulated entities.

DATES: Effective date: This final rule is effective on March 26, 2013.
    Compliance date: Covered entities and business associates must 
comply with the applicable requirements of this final rule by September 
23, 2013.

FOR FURTHER INFORMATION CONTACT: Andra Wicks 202-205-2292.

SUPPLEMENTARY INFORMATION: 

I. Executive Summary and Background

A. Executive Summary

i. Purpose of the Regulatory Action
Need for the Regulatory Action
    This final rule is needed to strengthen the privacy and security 
protections established under the Health Insurance Portability and 
Accountability of 1996 Act (HIPAA) for individual's health information 
maintained in electronic health records and other formats. This final 
rule also makes changes to the HIPAA rules that are designed to 
increase flexibility for and decrease burden on the regulated entities, 
as well as to harmonize certain requirements with those under the 
Department's Human Subjects Protections regulations. These changes are 
consistent with, and arise in part from, the Department's obligations 
under Executive Order 13563 to conduct a retrospective review of our 
existing regulations for the purpose of identifying ways to reduce 
costs and increase flexibilities under the HIPAA Rules. We discuss our 
specific burden reduction efforts more fully in the Regulatory Impact 
Analysis.
    This final rule is comprised of four final rules, which have been 
combined to reduce the impact and number of times certain compliance 
activities need to be undertaken by the regulated entities.
Legal Authority for the Regulatory Action
    The final rule implements changes to the HIPAA Rules under a number 
of authorities. First, the final rule modifies the Privacy, Security, 
and Enforcement Rules to strengthen privacy and security protections 
for health information and to improve enforcement as provided for by 
the Health Information Technology for Economic and Clinical Health 
(HITECH) Act, enacted as part of the American Recovery and Reinvestment 
Act of 2009 (ARRA). The rule also includes final modifications to the 
Breach Notification Rule, which will replace an interim final rule 
originally published in 2009 as required by the HITECH Act. Second, the 
final rule revises the HIPAA Privacy Rule to increase privacy 
protections for genetic information as required by the Genetic 
Information Nondiscrimination Act of 2008 (GINA). Finally, the 
Department uses its general authority under HIPAA to make a number of 
changes to the Rules that are intended to increase workability and 
flexibility, decrease burden, and better harmonize the requirements 
with those under other Departmental regulations.
ii. Summary of Major Provisions
    This omnibus final rule is comprised of the following four final 
rules:
    1. Final modifications to the HIPAA Privacy, Security, and 
Enforcement Rules mandated by the Health Information Technology for 
Economic and Clinical Health (HITECH) Act, and certain other 
modifications to improve the Rules, which were issued as a proposed 
rule on July 14, 2010. These modifications:
     Make business associates of covered entities directly 
liable for compliance with certain of the HIPAA Privacy and Security 
Rules' requirements.
     Strengthen the limitations on the use and disclosure of 
protected health information for marketing and fundraising purposes, 
and prohibit the sale of protected health information without 
individual authorization.
     Expand individuals' rights to receive electronic copies of 
their health information and to restrict disclosures to a health plan 
concerning treatment for which the individual has paid out of pocket in 
full.
     Require modifications to, and redistribution of, a covered 
entity's notice of privacy practices.
     Modify the individual authorization and other requirements 
to facilitate research and disclosure of child immunization proof to 
schools, and to enable access to decedent information by family members 
or others.
     Adopt the additional HITECH Act enhancements to the 
Enforcement Rule not previously adopted in the October 30, 2009, 
interim final rule (referenced immediately below), such as the 
provisions addressing enforcement of noncompliance with the HIPAA Rules 
due to willful neglect.
    2. Final rule adopting changes to the HIPAA Enforcement Rule to 
incorporate the increased and tiered civil money penalty structure 
provided by the HITECH Act, originally published as an interim final 
rule on October 30, 2009.
    3. Final rule on Breach Notification for Unsecured Protected Health 
Information under the HITECH Act, which replaces the breach 
notification rule's ``harm'' threshold with a more objective standard 
and supplants an interim final rule published on August 24, 2009.
    4. Final rule modifying the HIPAA Privacy Rule as required by the 
Genetic Information Nondiscrimination Act (GINA) to prohibit most 
health plans from using or disclosing genetic information for 
underwriting purposes, which was published as a proposed rule on 
October 7, 2009.

[[Page 5567]]

iii. Costs and Benefits
    This final rule is anticipated to have an annual effect on the 
economy of $100 million or more, making it an economically significant 
rule under Executive Order 12866. Accordingly, we have prepared a 
Regulatory Impact Analysis that presents the estimated costs and 
benefits of the proposed rule. The total cost of compliance with the 
rule's provisions is estimated to be between $114 million and $225.4 
million in the first year of implementation and approximately $14.5 
million annually thereafter. Costs associated with the rule include: 
(i) Costs to HIPAA covered entities of revising and distributing new 
notices of privacy practices to inform individuals of their rights and 
how their information is protected; (ii) costs to covered entities 
related to compliance with breach notification requirements; (iii) 
costs to a portion of business associates to bring their subcontracts 
into compliance with business associate agreement requirements; and 
(iv) costs to a portion of business associates to achieve full 
compliance with the Security Rule. We summarize these costs in Table 1 
below and explain the components and distribution of costs in detail in 
the Regulatory Impact Analysis.
    We are not able to quantify the benefits of the rule due to lack of 
data and the impossibility of monetizing the value of individuals' 
privacy and dignity, which we believe will be enhanced by the 
strengthened privacy and security protections, expanded individual 
rights, and improved enforcement enabled by the rule. We also believe 
that some entities affected by the rule will realize cost savings as a 
result of provisions that simplify and streamline certain requirements, 
and increase flexibility, under the HIPAA Rules. However, we are unable 
to quantify such cost savings due to a lack of data. We describe such 
benefits in the Regulatory Impact Analysis.

               Table 1--Estimated Costs of the Final Rule
------------------------------------------------------------------------
                                 Approximate number of
         Cost element              affected entities       Total cost
------------------------------------------------------------------------
Notices of Privacy Practices..  700,000 covered         $55.9 million.
                                 entities.
Breach Notification             19,000 covered          14.5 million.\1\
 Requirements.                   entities.
Business Associate Agreements.  250,000-500,000         21 million-42
                                 business associates     million.
                                 of covered entities.
Security Rule Compliance by     200,000-400,000         22.6 million-113
 Business Associates.            business associates     million.
                                 of covered entities.
                               -----------------------------------------
    Total.....................  ......................  114 million-
                                                         225.4 million.
------------------------------------------------------------------------

B. Statutory and Regulatory Background

i. HIPAA and the Privacy, Security, and Enforcement Rules
    The  HIPAA Privacy, Security, and Enforcement Rules implement 
certain of the Administrative Simplification provisions of title II, 
subtitle F, of the Health Insurance Portability and Accountability Act 
of 1996 (HIPAA) (Pub. L. 104-191), which added a new part C to title XI 
of the Social Security Act (sections 1171-1179 of the Social Security 
Act, 42 U.S.C. 1320d-1320d-8). The HIPAA Administrative Simplification 
provisions provided for the establishment of national standards for the 
electronic transmission of certain health information, such as 
standards for certain health care transactions conducted electronically 
and code sets and unique identifiers for health care providers and 
employers. The HIPAA Administrative Simplification provisions also 
required the establishment of national standards to protect the privacy 
and security of personal health information and established civil money 
penalties for violations of the Administrative Simplification 
provisions. The Administrative Simplification provisions of HIPAA apply 
to three types of entities, which are known as ``covered entities'': 
health care providers who conduct covered health care transactions 
electronically, health plans, and health care clearinghouses.
---------------------------------------------------------------------------

    \1\ The costs associated with breach notification will be 
incurred on an annual basis. All other costs are expected in the 
first year of implementation.
---------------------------------------------------------------------------

    The HIPAA Privacy Rule, 45 CFR Part 160 and Subparts A and E of 
Part 164, requires covered entities to have safeguards in place to 
ensure the privacy of protected health information, sets forth the 
circumstances under which covered entities may use or disclose an 
individual's protected health information, and gives individuals rights 
with respect to their protected health information, including rights to 
examine and obtain a copy of their health records and to request 
corrections. Covered entities that engage business associates to work 
on their behalf must have contracts or other arrangements in place with 
their business associates to ensure that the business associates 
safeguard protected health information, and use and disclose the 
information only as permitted or required by the Privacy Rule.
    The HIPAA Security Rule, 45 CFR Part 160 and Subparts A and C of 
Part 164, applies only to protected health information in electronic 
form and requires covered entities to implement certain administrative, 
physical, and technical safeguards to protect this electronic 
information. Like the Privacy Rule, covered entities must have 
contracts or other arrangements in place with their business associates 
that provide satisfactory assurances that the business associates will 
appropriately safeguard the electronic protected health information 
they create, receive, maintain, or transmit on behalf of the covered 
entities.
    The HIPAA Enforcement Rule, 45 CFR Part 160, Subparts C-E, 
establishes rules governing the compliance responsibilities of covered 
entities with respect to the enforcement process, including the rules 
governing investigations by the Department, rules governing the process 
and grounds for establishing the amount of a civil money penalty where 
a violation of a HIPAA Rule has been found, and rules governing the 
procedures for hearings and appeals where the covered entity challenges 
a violation determination.
    Since the promulgation of the HIPAA Rules, legislation has been 
enacted requiring modifications to the Rules. In particular, the Health 
Information Technology for Economic and Clinical Health (HITECH) Act, 
which was enacted on February 17, 2009, as title XIII of division A and 
title IV of division B of the American Recovery and Reinvestment Act of 
2009 (ARRA), Public Law 111-5, modifies certain provisions of the 
Social Security Act pertaining to the HIPAA Rules, as well as requires 
certain modifications to the Rules themselves, to strengthen HIPAA 
privacy, security, and enforcement. The

[[Page 5568]]

Act also provides new requirements for notification of breaches of 
unsecured protected health information by covered entities and business 
associates. In addition, the Genetic Information Nondiscrimination Act 
of 2008 (GINA) calls for changes to the HIPAA Privacy Rule to 
strengthen privacy protections for genetic information. This final rule 
implements the modifications required by GINA, as well as most of the 
privacy, security, and enforcement provisions of the HITECH Act. This 
final rule also includes certain other modifications to the HIPAA Rules 
to improve their workability and effectiveness.
ii. The Health Information Technology for Economic and Clinical Health 
Act
    The HITECH Act is designed to promote the widespread adoption and 
interoperability of health information technology. Subtitle D of title 
XIII, entitled ``Privacy,'' supports this goal by adopting amendments 
designed to strengthen the privacy and security protections for health 
information established by HIPAA. These provisions include extending 
the applicability of certain of the Privacy and Security Rules' 
requirements to the business associates of covered entities; requiring 
that Health Information Exchange Organizations and similar 
organizations, as well as personal health record vendors that provide 
services to covered entities, shall be treated as business associates; 
requiring HIPAA covered entities and business associates to provide for 
notification of breaches of ``unsecured protected health information''; 
establishing new limitations on the use and disclosure of protected 
health information for marketing and fundraising purposes; prohibiting 
the sale of protected health information; and expanding individuals' 
rights to access their protected health information, and to obtain 
restrictions on certain disclosures of protected health information to 
health plans. In addition, subtitle D adopts provisions designed to 
strengthen and expand HIPAA's enforcement provisions.
    We discuss these statutory provisions in more detail below where we 
describe section-by-section how this final rule implements the 
provisions. We do not address in this rulemaking the accounting for 
disclosures requirement in section 13405 of the Act, which is the 
subject of a separate proposed rule published on May 31, 2011, at 76 FR 
31426, or the penalty distribution methodology requirement in section 
13410(c) of the Act, which will be the subject of a future rulemaking.
    Since enactment of the HITECH Act a number of steps have been taken 
to implement the strengthened privacy, security, and enforcement 
provisions through rulemakings and related actions. On August 24, 2009, 
the Department published interim final regulations to implement the 
breach notification provisions at section 13402 of the HITECH Act (74 
FR 42740), which were effective September 23, 2009. Similarly, the 
Federal Trade Commission (FTC) published final regulations implementing 
the breach notification provisions at section 13407 for personal health 
record vendors and their third party service providers on August 25, 
2009 (74 FR 42962), effective September 24, 2009. For purposes of 
determining to what information the HHS and FTC breach notification 
regulations apply, the Department also issued, first on April 17, 2009 
(published on April 27, 2009, 74 FR 19006), and then later with its 
interim final rule, the guidance required by the HITECH Act under 
13402(h) specifying the technologies and methodologies that render 
protected health information unusable, unreadable, or indecipherable to 
unauthorized individuals. Additionally, to conform the provisions of 
the Enforcement Rule to the HITECH Act's tiered and increased civil 
money penalty structure, which became effective on February 18, 2009, 
the Department published an interim final rule on October 30, 2009 (74 
FR 56123), effective November 30, 2009.
    The Department published a notice of proposed rulemaking (NPRM) on 
July 14, 2010, (75 FR 40868) to implement many of the remaining 
privacy, security, and enforcement provisions of the HITECH Act. The 
public was invited to comment on the proposed rule for 60 days 
following publication. The comment period closed on September 13, 2010. 
The Department received about 300 comments on the NPRM.
    The NPRM proposed to extend the applicability of certain of the 
Privacy and Security Rules' requirements to the business associates of 
covered entities, making business associates directly liable for 
violations of these requirements. Additionally, the NPRM proposed to 
define a subcontractor as a business associate to ensure any protected 
health information the subcontractor creates or receives on behalf of 
the business associate is appropriately safeguarded. The NPRM proposed 
to establish new limitations on the use and disclosure of protected 
health information for marketing and fundraising purposes and to 
prohibit the sale of protected health information without an 
authorization. The NPRM also proposed to expand an individual's right 
to obtain an electronic copy of an individual's protected health 
information, and the right to restrict certain disclosures of protected 
health information to a health plan for payment or health care 
operations purposes. In addition, the NPRM proposed to further modify 
the Enforcement Rule to implement more of the HITECH Act's changes to 
HIPAA enforcement.
    In addition to the proposed modifications to implement the HITECH 
Act, the NPRM also proposed certain other modifications to the HIPAA 
Rules. The NPRM proposed to permit the use of compound authorizations 
for conditioned and unconditioned research activities and requested 
comment regarding permitting authorizations for future research. 
Additionally, the NPRM proposed to modify the Privacy Rule's 
application to the individually identifiable health information of 
decedents and to permit covered entities that obtain the agreement of a 
parent to provide proof of immunization without written authorization 
to schools that are required to have such information.
iii. The Genetic Information Nondiscrimination Act
    The Genetic Information Nondiscrimination Act of 2008 (``GINA''), 
Pub. L. 110-233, 122 Stat. 881, prohibits discrimination based on an 
individual's genetic information in both the health coverage (Title I) 
and employment (Title II) contexts. In addition to the 
nondiscrimination provisions, section 105 of Title I of GINA contains 
new privacy protections for genetic information, which require the 
Secretary of HHS to revise the Privacy Rule to clarify that genetic 
information is health information and to prohibit group health plans, 
health insurance issuers (including HMOs), and issuers of Medicare 
supplemental policies from using or disclosing genetic information for 
underwriting purposes.
    On October 7, 2009, the Department published a proposed rule to 
strengthen the privacy protections for genetic information under the 
HIPAA Privacy Rule by implementing the protections for genetic 
information required by GINA and making related changes to the Rule. 
The 60-day public comment period for the proposed rule closed on 
December 7, 2009. The Department received about 25 comments on the 
proposed rule.

II. Overview of the Final Rule

    In this final rule the Department finalizes the modifications to 
the HIPAA Privacy, Security, and Enforcement Rules to implement many of 
the

[[Page 5569]]

privacy, security, and enforcement provisions of the HITECH Act and 
make other changes to the Rules; modifies the Breach Notification Rule; 
finalizes the modifications to the HIPAA Privacy Rule to strengthen 
privacy protections for genetic information; and responds to the public 
comments received on the proposed and interim final rules. Section III 
below describes the effective and compliance dates of the final rule. 
Section IV describes the changes to the HIPAA Privacy, Security, and 
Enforcement Rules under the HITECH Act and other modifications that 
were proposed in July 2010, as well as the modifications to the 
Enforcement Rule under the HITECH Act that were addressed in the 
interim final rule published in October 2009. Section V describes the 
changes to the Breach Notification Rule. Section VI discusses the 
changes to the HIPAA Privacy Rule to strengthen privacy protections for 
genetic information.

III. Effective and Compliance Dates

    With respect to the HITECH Act requirements, section 13423 of the 
Act provides that the provisions in subtitle D took effect one year 
after enactment, i.e., on February 18, 2010, except as specified 
otherwise. However, there are a number of exceptions to this general 
rule. For example, the tiered and increased civil money penalty 
provisions of section 13410(d) were effective for violations occurring 
after the date of enactment, and sections 13402 and 13407 of the Act 
regarding breach notification required interim final rules within 180 
days of enactment, with effective dates 30 days after the publication 
of such rules. Other provisions of the Act have later effective dates. 
For example, the provision at section 13410(a)(1) of the Act providing 
that the Secretary's authority to impose a civil money penalty will 
only be barred to the extent a criminal penalty has been imposed, 
rather than in cases in which the offense in question merely 
constitutes an offense that is criminally punishable, became effective 
for violations occurring on or after February 18, 2011. The discussion 
below generally pertains to the statutory provisions that became 
effective on February 18, 2010, or, in a few cases, on a later date.

Proposed Rule

    We proposed that covered entities and business associates would 
have 180 days beyond the effective date of the final rule to come into 
compliance with most of the rule's provisions. We believed that a 180-
day compliance period would suffice for future modifications to the 
HIPAA Rules, and we proposed to add a provision at Sec.  160.105 to 
address the compliance date generally for implementation of new or 
modified standards in the HIPAA Rules. We proposed that Sec.  160.105 
would provide that with respect to new standards or implementation 
specifications or modifications to standards or implementation 
specifications in the HIPAA Rules, except as otherwise provided, 
covered entities and business associates would be required to comply 
with the applicable new or modified standards or implementation 
specifications no later than 180 days from the effective date of any 
such change. For future modifications to the HIPAA Rules necessitating 
a longer compliance period, we would specify a longer period in the 
regulatory text. Finally, we proposed to retain the compliance date 
provisions at Sec. Sec.  164.534 and 164.318, which provide the 
compliance dates of April 14, 2003, and April 20, 2005, for initial 
implementation of the HIPAA Privacy and Security Rules, respectively, 
for historical purposes only.

Overview of Public Comments

    Most of the comments addressing the proposed compliance periods as 
outlined above fell into three categories. First, several commenters 
supported the proposed compliance timelines and agreed that 180 days is 
sufficient time for covered entities, business associates, and 
subcontractors of all sizes to come into compliance with the final 
rule. Second, a few commenters supported the proposed 180-day 
compliance period, but expressed concern that the Department may wish 
to extend the 180-day compliance period in the future, if it issues 
modifications or new provisions that require a longer compliance 
period. Third, several commenters requested that the Department extend 
the 180-day compliance period both with regard to the modifications 
contained in this final rule and with regard to the more general 
proposed compliance deadline, as they believe 180 days is an 
insufficient amount of time for covered entities, business associates, 
and subcontractors to come into compliance with the modified rules, 
particularly with regard to changes in technology.

Final Rule

    The final rule is effective on March 26, 2013. Covered entities and 
business associates of all sizes will have 180 days beyond the 
effective date of the final rule to come into compliance with most of 
the final rule's provisions, including the modifications to the Breach 
Notification Rule and the changes to the HIPAA Privacy Rule under GINA. 
We understand that some covered entities, business associates, and 
subcontractors remain concerned that a 180-day period does not provide 
sufficient time to come into compliance with the modifications. 
However, we believe not only that providing a 180-day compliance period 
best comports with section 1175(b)(2) of the Social Security Act, 42 
U.S.C. 1320d-4, and our implementing provision at Sec.  160.104(c)(1), 
which require the Secretary to provide at least a 180-day period for 
covered entities to comply with modifications to standards and 
implementation specifications in the HIPAA Rules, but also that 
providing a 180-day compliance period best protects the privacy and 
security of patient information, in accordance with the goals of the 
HITECH Act.
    In addition, to make clear to the industry our expectation that 
going forward we will provide a 180-day compliance date for future 
modifications to the HIPAA Rules, we adopt the provision we proposed at 
Sec.  160.105, which provides that with respect to new or modified 
standards or implementation specifications in the HIPAA Rules, except 
as otherwise provided, covered entities and business associates must 
comply with the applicable new or modified standards or implementation 
specifications no later than 180 days from the effective date of any 
such change. In cases where a future modification necessitates a longer 
compliance period, the Department will expressly provide for one, as it 
has done in this rulemaking with respect to the time permitted for 
business associate agreements to be modified.
    For the reasons proposed, the final rule also retains the 
compliance date provisions at Sec. Sec.  164.534 and 164.318, which 
provide the compliance dates of April 14, 2003, and April 20, 2005, for 
initial implementation of the HIPAA Privacy and Security Rules, 
respectively. We note that Sec.  160.105 regarding the compliance date 
of new or modified standards or implementation specifications does not 
apply to modifications to the provisions of the HIPAA Enforcement Rule, 
because such provisions are not standards or implementation 
specifications (as the terms are defined at Sec.  160.103). Such 
provisions are in effect and apply at the time the final rule becomes 
effective or as otherwise specifically provided. In addition, as 
explained above, our general rule for a 180-day compliance period for 
new or modified standards would not apply where we expressly provide a 
different compliance period in

[[Page 5570]]

the regulation for one or more provisions. For purposes of this rule, 
the 180-day compliance period would not govern the time period required 
to modify those business associate agreements that qualify for the 
longer transition period in Sec.  164.532, as we discuss further below.
    Finally, the provisions of section 13402(j) of the HITECH Act apply 
to breaches of unsecured protected health information discovered on or 
after September 23, 2009, the date of the publication of the interim 
final rule. Thus, during the 180 day period before compliance with this 
final rule is required, covered entities and business associates are 
still required to comply with the breach notification requirements 
under the HITECH Act and must continue to comply with the requirements 
of the interim final rule. We believe that this transition period 
provides covered entities and business associates with adequate time to 
come into compliance with the revisions in this final rule and at the 
same time to continue to fulfill their breach notification obligations 
under the HITECH Act.

IV. Modifications to the HIPAA Privacy, Security, and Enforcement Rules 
Under the HITECH Act; Other Modifications to the HIPAA Rules

    The discussion below provides a section-by-section description of 
the final rule, as well as responds to public comments where 
substantive comments were received regarding particular provisions.

A. Subparts A and B of Part 160: Statutory Basis and Purpose, 
Applicability, Definitions, and Preemption of State Law

    Subpart A of Part 160 of the HIPAA Rules contains general 
provisions that apply to all of the HIPAA Rules. Subpart B of Part 160 
contains the regulatory provisions implementing HIPAA's preemption 
provisions. We proposed to amend a number of these provisions. Some of 
the proposed, and now final, changes are necessitated by the statutory 
changes made by the HITECH Act and GINA, while others are of a 
technical or conforming nature.
1. Subpart A--General Provisions, Section 160.101--Statutory Basis and 
Purpose
    This section sets out the statutory basis and purpose of the HIPAA 
Rules. We proposed and include in this final rule a technical change to 
include references to the provisions of GINA and the HITECH Act upon 
which most of the regulatory changes below are based.
2. Subpart A--General Provisions, Section 160.102--Applicability
    This section sets out to whom the HIPAA Rules apply. We proposed to 
add and include in this final rule a new paragraph (b) to make clear, 
consistent with the HITECH Act, that certain of the standards, 
requirements, and implementation specifications of the subchapter apply 
to business associates.
3. Subpart A--General Provisions, Section 160.103--Definitions
    Section 160.103 contains definitions of terms that appear 
throughout the HIPAA Rules. The final rule modifies a number of these 
definitions to implement the HITECH Act and make other needed changes.
a. Definition of ``Business Associate''
    The HIPAA Privacy and Security Rules permit a covered entity to 
disclose protected health information to a business associate, and 
allow a business associate to create, receive, maintain, or transmit 
protected health information on its behalf, provided the covered entity 
obtains satisfactory assurances in the form of a contract or other 
arrangement that the business associate will appropriately safeguard 
the information. The HIPAA Rules define ``business associate'' 
generally to mean a person who performs functions or activities on 
behalf of, or certain services for, a covered entity that involve the 
use or disclosure of protected health information. We proposed a number 
of modifications to the definition of ``business associate'' to 
implement the HITECH Act, to conform the term to the statutory 
provisions of the Patient Safety and Quality Improvement Act of 2005 
(PSQIA), 42 U.S.C. 299b-21, et seq., and to make other changes to the 
definition.
i. Inclusion of Patient Safety Organizations
Proposed Rule
    We proposed to add patient safety activities to the list of 
functions and activities a person may undertake on behalf of a covered 
entity that give rise to a business associate relationship. PSQIA, at 
42 U.S.C. 299b-22(i)(1), provides that Patient Safety Organizations 
(PSOs) must be treated as business associates when applying the Privacy 
Rule. PSQIA provides for the establishment of PSOs to receive reports 
of patient safety events or concerns from providers and provide 
analyses of events to reporting providers. A reporting provider may be 
a HIPAA covered entity and, thus, information reported to a PSO may 
include protected health information that the PSO may analyze on behalf 
of the covered provider. The analysis of such information is a patient 
safety activity for purposes of PSQIA and the Patient Safety Rule, 42 
CFR 3.10, et seq. While the HIPAA Rules as written would treat a PSO as 
a business associate when the PSO was performing quality analyses and 
other activities on behalf of a covered health care provider, we 
proposed this change to the definition of ``business associate'' to 
more clearly align the HIPAA and Patient Safety Rules.
Overview of Public Comment
    Commenters on this topic supported the express inclusion of patient 
safety activities within the definition of ``business associate.''
Final Rule
    The final rule adopts the proposed modification.
ii. Inclusion of Health Information Organizations (HIO), E-Prescribing 
Gateways, and Other Persons That Facilitate Data Transmission; as Well 
as Vendors of Personal Health Records
Proposed Rule
    Section 13408 of the HITECH Act provides that an organization, such 
as a Health Information Exchange Organization, E-prescribing Gateway, 
or Regional Health Information Organization, that provides data 
transmission of protected health information to a covered entity (or 
its business associate) and that requires access on a routine basis to 
such protected health information must be treated as a business 
associate for purposes of the Act and the HIPAA Privacy and Security 
Rules. Section 13408 also provides that a vendor that contracts with a 
covered entity to allow the covered entity to offer a personal health 
record to patients as part of the covered entity's electronic health 
record shall be treated as a business associate. Section 13408 requires 
that such organizations and vendors enter into a written business 
associate contract or other arrangement with the covered entity in 
accordance with the HIPAA Rules.
    In accordance with the Act, we proposed to modify the definition of 
``business associate'' to explicitly designate these persons as 
business associates. Specifically, we proposed to include in the 
definition: (1) A Health Information Organization, E-prescribing 
Gateway, or other person that provides data transmission services with 
respect

[[Page 5571]]

to protected health information to a covered entity and that requires 
routine access to such protected health information; and (2) a person 
who offers a personal health record to one or more individuals on 
behalf of a covered entity.
    We proposed to refer to ``Health Information Organization'' in the 
NPRM rather than ``Health Information Exchange Organization'' as used 
in the Act because it is our understanding that ``Health Information 
Organization'' is the more widely recognized and accepted term to 
describe an organization that oversees and governs the exchange of 
health-related information among organizations.\2\ The Act also 
specifically refers to Regional Health Information Organizations; 
however, we did not believe the inclusion of the term in the definition 
of ``business associate'' was necessary as a Regional Health 
Information Organization is simply a Health Information Organization 
that governs health information exchange among organizations within a 
defined geographic area.\3\ Further, the specific terms of ``Health 
Information Organization'' and ``E-prescribing Gateway'' were included 
as merely illustrative of the types of organizations that would fall 
within this paragraph of the definition of ``business associate.'' We 
requested comment on the use of these terms within the definition and 
whether additional clarifications or additions were necessary.
---------------------------------------------------------------------------

    \2\ Department of Health and Human Services Office of the 
National Coordinator for Health Information Technology, The National 
Alliance for Health Information Technology Report to the Office of 
the National Coordinator for Health Information Technology: Defining 
Key Health Information Terms, Pg. 24 (2008).
    \3\ Id. at 25.
---------------------------------------------------------------------------

    Section 13408 also provides that the data transmission 
organizations that the Act requires to be treated as business 
associates are those that require access to protected health 
information on a routine basis. Conversely, data transmission 
organizations that do not require access to protected health 
information on a routine basis would not be treated as business 
associates. This is consistent with our prior interpretation of the 
definition of ``business associate,'' through which we have stated that 
entities that act as mere conduits for the transport of protected 
health information but do not access the information other than on a 
random or infrequent basis are not business associates. See https://www.hhs.gov/ocr/privacy/hipaa/faq/providers/business/245.html. In 
contrast, entities that manage the exchange of protected health 
information through a network, including providing record locator 
services and performing various oversight and governance functions for 
electronic health information exchange, have more than ``random'' 
access to protected health information and thus, would fall within the 
definition of ``business associate.''
Overview of Public Comments
    Commenters generally supported the inclusion of Health Information 
Organizations, personal health record vendors, and similar entities in 
the definition of ``business associate.'' However, commenters sought 
various clarifications as discussed below.
    Commenters generally supported use of the term Health Information 
Organization in lieu of more restrictive terms, such as Regional Health 
Information Organization. Some commenters suggested that the term 
Health Information Organization be defined, so as to avoid confusion as 
the industry develops, and suggested various alternatives for doing so. 
Several commenters recommended that the Office for Civil Rights (OCR) 
maintain a Web site link that lists current terms for entities that OCR 
considers to be Health Information Organizations.
    Other commenters requested clarification on what it means to have 
``access on a routine basis'' to protected health information for 
purposes of the definition and determining whether certain entities are 
excluded as mere conduits. For example, commenters asked whether the 
definition of business associate would include broadband suppliers or 
internet service providers, vendors that only have the potential to 
come into contact with protected health information, or entities 
contracted on a contingency basis that may at some point in the future 
have access to protected health information. Several document storage 
companies argued that entities like theirs should be characterized as 
conduits, as they do not view the protected health information they 
store.
    Several commenters sought clarification regarding when personal 
health record vendors would be considered business associates. For 
example, commenters asked whether personal health record vendors would 
be business associates when the vendor provided the personal health 
record in collaboration with the covered entity, when the personal 
health record is linked to a covered entity's electronic health record, 
or when the personal health record is offered independently to the 
individual, among other scenarios. One commenter suggested that a 
vendor offering a personal health record to a patient on behalf of a 
covered entity only acts as a conduit because there is no access by the 
vendor to protected health information; another commenter suggested 
that personal health record vendors be business associates only when 
they have routine access to protected health information.
Final Rule
    The final rule adopts the language that expressly designates as 
business associates: (1) A Health Information Organization, E-
prescribing Gateway, or other person that provides data transmission 
services with respect to protected health information to a covered 
entity and that requires routine access to such protected health 
information; and (2) a person who offers a personal health record to 
one or more individuals on behalf of a covered entity.
    We decline to provide a definition for Health Information 
Organization. We recognize that the industry continues to develop and 
thus the type of entities that may be considered Health Information 
Organizations continues to evolve. For this reason, we do not think it 
prudent to include in the regulation a specific definition at this 
time. We anticipate continuing to issue guidance in the future on our 
web site on the types of entities that do and do not fall within the 
definition of business associate, which can be updated as the industry 
evolves.
    Regarding what it means to have ``access on a routine basis'' to 
protected health information with respect to determining which types of 
data transmission services are business associates versus mere 
conduits, such a determination will be fact specific based on the 
nature of the services provided and the extent to which the entity 
needs access to protected health information to perform the service for 
the covered entity. The conduit exception is a narrow one and is 
intended to exclude only those entities providing mere courier 
services, such as the U.S. Postal Service or United Parcel Service and 
their electronic equivalents, such as internet service providers (ISPs) 
providing mere data transmission services. As we have stated in prior 
guidance, a conduit transports information but does not access it other 
than on a random or infrequent basis as necessary to perform the 
transportation service or as required by other law. For example, a 
telecommunications company may have occasional, random access to 
protected health information when it reviews whether the data 
transmitted over its network is arriving

[[Page 5572]]

at its intended destination. Such occasional, random access to 
protected health information would not qualify the company as a 
business associate. In contrast, an entity that requires access to 
protected health information in order to perform a service for a 
covered entity, such as a Health Information Organization that manages 
the exchange of protected health information through a network on 
behalf of covered entities through the use of record locator services 
for its participants (and other services), is not considered a conduit 
and, thus, is not excluded from the definition of business associate. 
We intend to issue further guidance in this area as electronic health 
information exchange continues to evolve.
    We note that the conduit exception is limited to transmission 
services (whether digital or hard copy), including any temporary 
storage of transmitted data incident to such transmission. In contrast, 
an entity that maintains protected health information on behalf of a 
covered entity is a business associate and not a conduit, even if the 
entity does not actually view the protected health information. We 
recognize that in both situations, the entity providing the service to 
the covered entity has the opportunity to access the protected health 
information. However, the difference between the two situations is the 
transient versus persistent nature of that opportunity. For example, a 
data storage company that has access to protected health information 
(whether digital or hard copy) qualifies as a business associate, even 
if the entity does not view the information or only does so on a random 
or infrequent basis. Thus, document storage companies maintaining 
protected health information on behalf of covered entities are 
considered business associates, regardless of whether they actually 
view the information they hold. To help clarify this point, we have 
modified the definition of ``business associate'' to generally provide 
that a business associate includes a person who ``creates, receives, 
maintains, or transmits'' (emphasis added) protected health information 
on behalf of a covered entity.
    Several commenters sought clarification on when a personal health 
record vendor would be providing a personal health record ``on behalf 
of'' a covered entity and thus, would be a business associate for 
purposes of the HIPAA Rules. As with data transmission services, 
determining whether a personal health record vendor is a business 
associate is a fact specific determination. A personal health record 
vendor is not a business associate of a covered entity solely by virtue 
of entering into an interoperability relationship with a covered 
entity. For example, when a personal health record vendor and a covered 
entity establish the electronic means for a covered entity's electronic 
health record to send protected health information to the personal 
health record vendor pursuant to the individual's written 
authorization, it does not mean that the personal health record vendor 
is offering the personal health record on behalf of the covered entity, 
even if there is an agreement between the personal health record vendor 
and the covered entity governing the exchange of data (such as an 
agreement specifying the technical specifications for exchanging of 
data or specifying that such data shall be kept confidential). In 
contrast, when a covered entity hires a vendor to provide and manage a 
personal health record service the covered entity wishes to offer its 
patients or enrollees, and provides the vendor with access to protected 
health information in order to do so, the personal health record vendor 
is a business associate.
    A personal health record vendor may offer personal health records 
directly to individuals and may also offer personal health records on 
behalf of covered entities. In such cases, the personal health record 
vendor is only subject to HIPAA as a business associate with respect to 
personal health records that are offered to individuals on behalf of 
covered entities.
    We also clarify that, contrary to one commenter's suggestion, a 
personal health record vendor that offers a personal health record to a 
patient on behalf of a covered entity does not act merely as a conduit. 
Rather, the personal health record vendor is maintaining protected 
health information on behalf of the covered entity (for the benefit of 
the individual). Further, a personal health record vendor that operates 
a personal health record on behalf of a covered entity is a business 
associate if it has access to protected health information, regardless 
of whether the personal health record vendor actually exercises this 
access. We believe the revisions to the definition of ``business 
associate'' discussed above clarify these points. As with other aspects 
of the definition of ``business associate,'' we intend to provide 
future guidance on when a personal health record vendor is a business 
associate for purposes of the HIPAA Rules.
Response to Other Public Comments
    Comment: One commenter recommended that the term ``person'' used in 
describing who provides transmission services to a covered entity be 
clarified to apply also to entities and organizations.
    Response: The term ``person'' as defined at Sec.  160.103 includes 
entities as well as natural persons.
    Comment: One commenter asked whether subcontractors that support 
business associates with personal health record related functions are 
subject to the breach notification requirements under the HIPAA Breach 
Notification Rule or that of the FTC.
    Response: As discussed below, a subcontractor that creates, 
receives, maintains, or transmits protected health information on 
behalf of a business associate, including with respect to personal 
health record functions, is a HIPAA business associate and thus, is 
subject to the HIPAA Breach Notification Rule and not that of the FTC. 
The analysis of whether a subcontractor is acting on behalf of a 
business associate is the same analysis as discussed above with respect 
to whether a business associate is acting on behalf of a covered 
entity.
iii. Inclusion of Subcontractors
Proposed Rule
    We proposed in the definition of ``business associate'' to provide 
that subcontractors of a covered entity, i.e., those persons that 
perform functions for or provide services to a business associate other 
than in the capacity as a member of the business associate's workforce, 
are also business associates to the extent that they require access to 
protected health information. We also proposed to define 
``subcontractor'' in Sec.  160.103 as a person who acts on behalf of a 
business associate, other than in the capacity of a member of the 
workforce of such business associate. Even though we used the term 
``subcontractor,'' which implies there is a contract in place between 
the parties, the definition would apply to an agent or other person who 
acts on behalf of the business associate, even if the business 
associate has failed to enter into a business associate contract with 
the person. We requested comment on the use of the term 
``subcontractor'' and its proposed definition.
    The intent of the proposed extension of the Rules to subcontractors 
was to avoid having privacy and security protections for protected 
health information lapse merely because a function is performed by an 
entity that is a subcontractor rather than an entity

[[Page 5573]]

with a direct relationship with a covered entity. Allowing such a lapse 
in privacy and security protections could allow business associates to 
avoid liability imposed upon them by sections 13401 and 13404 of the 
Act. Further, applying HIPAA privacy and security requirements directly 
to subcontractors also ensures that the privacy and security 
protections of the HIPAA Rules extend beyond covered entities to those 
entities that create or receive protected health information in order 
for the covered entity to perform its health care functions. Therefore, 
we proposed that downstream entities that work at the direction of or 
on behalf of a business associate and handle protected health 
information would also be required to comply with the applicable 
Privacy and Security Rule provisions in the same manner as the primary 
business associate, and likewise would incur liability for acts of 
noncompliance. This proposed modification would not require the covered 
entity to have a contract with the subcontractor; rather, the 
obligation would remain on each business associate to obtain 
satisfactory assurances in the form of a written contract or other 
arrangement that a subcontractor will appropriately safeguard protected 
health information. For example, if a business associate, such as a 
third party administrator, hires a company to handle document and media 
shredding to securely dispose of paper and electronic protected health 
information, then the shredding company would be directly required to 
comply with the applicable requirements of the HIPAA Security Rule 
(e.g., with respect to proper disposal of electronic media) and the 
Privacy Rule (e.g., with respect to limiting its uses and disclosures 
of the protected health information in accordance with its contract 
with the business associate).
Overview of Public Comments
    While some commenters generally supported extending the business 
associate provisions of the Rules to subcontractors, many opposed such 
an extension arguing, among other things, that doing so was not the 
intent of Congress and beyond the statutory authority of the 
Department, that confusion may ensue with covered entities seeking to 
establish direct business associate contracts with subcontractors or 
prohibiting business associates from establishing subcontractor 
relationships altogether, and/or that creating direct liability for 
subcontractors will discourage such entities from operating and 
participating in the health care industry. Some commenters asked how 
far down the ``chain'' of subcontractors do the HIPAA Rules apply--
i.e., do the Rules apply only to the first tier subcontractor or to all 
subcontractors down the chain.
    In response to our request for comment on this issue, several 
commenters were concerned that use of the term subcontractor was 
confusing and instead suggested a different term be used, such as 
business associate contractor or downstream business associate, to 
avoid confusion between primary business associates of a covered entity 
and subcontractors. Other commenters suggested changes to the 
definition of subcontractor itself to better clarify the scope of the 
definition.
    Several commenters requested specific guidance on who is and is not 
a subcontractor under the definitions of ``business associate'' and 
``subcontractor.'' For example, one commenter asked whether an entity 
that shreds documents for a business associate for the business 
associate's activities and not for the covered entity, would qualify as 
a subcontractor. Another commenter asked whether disclosures by a 
business associate of protected health information for its own 
management and administration or legal needs creates a subcontractor 
relationship. Other commenters recommended that subcontractors without 
routine access to protected health information, or who do not access 
protected health information at all for their duties, not be considered 
business associates.
Final Rule
    The final rule adopts the proposal to apply the business associate 
provisions of the HIPAA Rules to subcontractors and thus, provides in 
the definition of ``business associate'' that a business associate 
includes a ``subcontractor that creates, receives, maintains, or 
transmits protected health information on behalf of the business 
associate.'' In response to comments, we clarify the definition of 
``subcontractor'' in Sec.  160.103 to provide that subcontractor means: 
``a person to whom a business associate delegates a function, activity, 
or service, other than in the capacity of a member of the workforce of 
such business associate.'' Thus, a subcontractor is a person to whom a 
business associate has delegated a function, activity, or service the 
business associate has agreed to perform for a covered entity or 
business associate. A subcontractor is then a business associate where 
that function, activity, or service involves the creation, receipt, 
maintenance, or transmission of protected health information. We also 
decline to replace the term ``subcontractor'' with another, as we were 
not persuaded by any of the alternatives suggested by commenters (e.g., 
``business associate contractor,'' ``downstream business associate,'' 
or ``downstream entity'').
    We disagree with the commenters that suggested that applying the 
business associate provisions of the HIPAA Rules to subcontractors is 
beyond the Department's statutory authority. In the HITECH Act, 
Congress created direct liability under the HIPAA Privacy and Security 
Rules for persons that are not covered entities but that create or 
receive protected health information in order for a covered entity to 
perform its health care functions, to ensure individuals' personal 
health information remains sufficiently protected in the hands of these 
entities. As stated in the NPRM, applying the business associate 
provisions only to those entities that have a direct relationship with 
a covered entity does not achieve that intended purpose. Rather, it 
allows privacy and security protections for protected health 
information to lapse once a subcontractor is enlisted to assist in 
performing a function, activity, or service for the covered entity, 
while at the same time potentially allowing certain primary business 
associates to avoid liability altogether for the protection of the 
information the covered entity has entrusted to the business associate. 
Further, section 13422 of the HITECH Act provides that each reference 
in the Privacy subtitle of the Act to a provision of the HIPAA Rules 
refers to such provision as in effect on the date of enactment of the 
Act or to the most recent update of such provision (emphasis added). 
Thus, the Act does not bar the Department from modifying definitions of 
terms in the HIPAA Rules to which the Act refers. Rather, the statute 
expressly contemplates that modifications to the terms may be necessary 
to carry out the provisions of the Act or for other purposes.
    Further, we do not agree that covered entities will be confused and 
seek to establish direct business associate contracts with 
subcontractors or will prohibit business associates from engaging 
subcontractors to perform functions or services that require access to 
protected health information. The final rule makes clear that a covered 
entity is not required to enter into a contract or other arrangement 
with a business associate that is a subcontractor. See Sec. Sec.  
164.308(b)(1) and 164.502(e)(1)(i). In addition, as commenters did not 
present direct evidence to the contrary, we do not believe that covered 
entities will begin

[[Page 5574]]

prohibiting business associates from engaging subcontractors as a 
result of the final rule, in cases where they were not doing so before. 
Rather, we believe that making subcontractors directly liable for 
violations of the applicable provisions of the HIPAA Rules will help to 
alleviate concern on the part of covered entities that protected health 
information is not adequately protected when provided to 
subcontractors.
    The Department also believes that the privacy and security 
protections for an individual's personal health information and 
associated liability for noncompliance with the Rules should not lapse 
beyond any particular business associate that is a subcontractor. Thus, 
under the final rule, covered entities must ensure that they obtain 
satisfactory assurances required by the Rules from their business 
associates, and business associates must do the same with regard to 
subcontractors, and so on, no matter how far ``down the chain'' the 
information flows. This ensures that individuals' health information 
remains protected by all parties that create, receive, maintain, or 
transmit the information in order for a covered entity to perform its 
health care functions. For example, a covered entity may contract with 
a business associate (contractor), the contractor may delegate to a 
subcontractor (subcontractor 1) one or more functions, services, or 
activities the business associate has agreed to perform for the covered 
entity that require access to protected health information, and the 
subcontractor may in turn delegate to another subcontractor 
(subcontractor 2) one or more functions, services, or activities it has 
agreed to perform for the contractor that require access to protected 
health information, and so on. Both the contractor and all of the 
subcontractors are business associates under the final rule to the 
extent they create, receive, maintain, or transmit protected health 
information.
    With respect to requests for specific guidance on who is and is not 
a subcontractor, we believe the above changes to the definition provide 
further clarity. We also provide the following in response to specific 
comments. Disclosures by a business associate pursuant to Sec.  
164.504(e)(4) and its business associate contract for its own 
management and administration or legal responsibilities do not create a 
business associate relationship with the recipient of the protected 
health information because such disclosures are made outside of the 
entity's role as a business associate. However, for such disclosures 
that are not required by law, the Rule requires that the business 
associate obtain reasonable assurances from the person to whom the 
information is disclosed that it will be held confidentially and used 
or further disclosed only as required by law or for the purposes for 
which it was disclosed to the person and the person notifies the 
business associate of any instances of which it is aware that the 
confidentiality of the information has been breached. See Sec.  
164.504(e)(4)(ii)(B).
    In contrast, disclosures of protected health information by the 
business associate to a person who will assist the business associate 
in performing a function, activity, or service for a covered entity or 
another business associate may create a business associate relationship 
depending on the circumstances. For example, an entity hired by a 
business associate to appropriately dispose of documents that contain 
protected health information is also a business associate and subject 
to the applicable provisions of the HIPAA Rules. If the documents to be 
shredded do not contain protected health information, then the entity 
is not a business associate. We also clarify that the same 
interpretations that apply to determining whether a first tier 
contractor is a business associate also apply to determining whether a 
subcontractor is a business associate. Thus, our interpretation of who 
is and is not excluded from the definition of business associate as a 
conduit also applies in the context of subcontractors as well. We refer 
readers to the above discussion regarding transmission services and 
conduits.
iv. Exceptions to Business Associate
Proposed Rule
    Sections 164.308(b)(2) and 164.502(e)(1)(ii) of the HIPAA Rules 
currently describe certain circumstances, such as when a covered entity 
discloses protected health information to a health care provider 
concerning the treatment of an individual, in which a covered entity is 
not required to enter into a business associate contract or other 
arrangement with the recipient of the protected health information. We 
proposed to move these provisions to the definition of ``business 
associate'' itself as exceptions to make clear that the Department does 
not consider the recipients of the protected health information in 
these circumstances to be business associates. The movement of these 
exceptions also was intended to help clarify that a person or an entity 
is a business associate if the person or entity meets the definition of 
``business associate,'' even if a covered entity, or business associate 
with respect to a subcontractor, fails to enter into the required 
business associate contract with the person or entity.
Final Rule
    The Department did not receive substantive public comment on this 
proposal. The final rule includes the exceptions within the definition 
of ``business associate.''
v. Technical Changes to the Definition
Proposed Rule
    For clarity and consistency, we also proposed to change the term 
``individually identifiable health information'' in the current 
definition of ``business associate'' to ``protected health 
information,'' since a business associate has no obligation under the 
HIPAA Rules with respect to individually identifiable health 
information that is not protected health information.
Final Rule
    The Department did not receive substantive public comment on this 
proposal. The final rule adopts the proposed modification to the 
definition. Additionally, as indicated above, we have revised the 
definition of business associate to clarify that a business associate 
includes an entity that ``creates, receives, maintains, or transmits'' 
protected health information on behalf of a covered entity. This change 
is intended to make the definition more consistent with language at 
Sec.  164.308(b) of the Security Rule and Sec.  164.502(e) of the 
Privacy Rule, as well as to clarify that entities that maintain or 
store protected health information on behalf of a covered entity are 
business associates, even if they do not actually view the protected 
health information.
vi. Response to Other Public Comments
    Comment: One commenter suggested that some covered entities do not 
treat third party persons that handle protected health information 
onsite as a business associate.
    Response: A covered entity may treat a contractor who has his or 
her duty station onsite at a covered entity and who has more than 
incidental access to protected health information as either a member of 
the covered entity's workforce or as a business associate for purposes 
of the HIPAA Rules.
    Comment: A few commenters asked for confirmation that researchers 
are not considered business associates. In addition, the Secretary's 
Advisory

[[Page 5575]]

Committee on Human Research Protections, in its November 23, 2010, 
letter to the Secretary providing comments on the NPRM, asked the 
Department to confirm that outsourced research review, approval, and 
continuing oversight functions (such as through using an external or 
independent Institutional Review Board) similarly do not give rise to a 
business associate relationship.
    Response: A person or entity is a business associate only in cases 
where the person or entity is conducting a function or activity 
regulated by the HIPAA Rules on behalf of a covered entity, such as 
payment or health care operations, or providing one of the services 
listed in the definition of ``business associate,'' and in the 
performance of such duties the person or entity has access to protected 
health information. Thus, an external researcher is not a business 
associate of a covered entity by virtue of its research activities, 
even if the covered entity has hired the researcher to perform the 
research. See https://www.hhs.gov/ocr/privacy/hipaa/faq/business_associates/239.html. Similarly, an external or independent 
Institutional Review Board is not a business associate of a covered 
entity by virtue of its performing research review, approval, and 
continuing oversight functions.
    However, a researcher may be a business associate if the researcher 
performs a function, activity, or service for a covered entity that 
does fall within the definition of business associate, such as the 
health care operations function of creating a de-identified or limited 
data set for the covered entity. See paragraph (6)(v) of the definition 
of ``health care operations.'' Where the researcher is also the 
intended recipient of the de-identified data or limited data set, the 
researcher must return or destroy the identifiers at the time the 
business associate relationship to create the data set terminates and 
the researcher now wishes to use the de-identified data or limited data 
set (subject to a data use agreement) for a research purpose.
    Comment: A few commenters asked for clarification as to whether the 
business associate provisions applied to banking and financial 
institutions. Commenters sought clarification as to whether the 
exemption at Sec.  1179 of the HIPAA statute for financial institutions 
was applicable to subcontractors.
    Response: This final rule is not intended to affect the status of 
financial institutions with respect to whether they are business 
associates. The HIPAA Rules, including the business associate 
provisions, do not apply to banking and financial institutions with 
respect to the payment processing activities identified in Sec.  1179 
of the HIPAA statute, for example, the activity of cashing a check or 
conducting a funds transfer. Section 1179 of HIPAA exempts certain 
activities of financial institutions from the HIPAA Rules, to the 
extent that these activities constitute authorizing, processing, 
clearing, settling, billing, transferring, reconciling, or collecting 
payments for health care or health plan premiums. However, a banking or 
financial institution may be a business associate where the institution 
performs functions above and beyond the payment processing activities 
identified above on behalf of a covered entity, such as performing 
accounts receivable functions on behalf of a health care provider.
    We clarify that our inclusion of subcontractors in the definition 
of business associate does not impact the exclusion of financial 
institutions from the definition of ``business associates'' when they 
are only conducting payment processing activities that fall under Sec.  
1179 of the HIPAA statute. Accordingly, a business associate need not 
enter into a business associate agreement with a financial institution 
that is solely conducting payment activities that are excluded under 
Sec.  1179.
    Comment: One commenter sought clarification of the status of a risk 
management group or malpractice insurance company that receives 
protected health information when contracted with a covered entity to 
mitigate the covered entity's risk and then contracts with legal groups 
to represent the covered entity during malpractice claims.
    Response: A business associate agreement is not required where a 
covered entity purchases a health plan product or other insurance, such 
as medical liability insurance, from an insurer. However, a business 
associate relationship could arise if the insurer is performing a 
function on behalf of, or providing services to, the covered entity 
that does not directly relate to the provision of insurance benefits, 
such as performing risk management or assessment activities or legal 
services for the covered entity, that involve access to protected 
health information.
b. Definition of ``Electronic Media''
Proposed Rule
    The term ``electronic media'' was originally defined in the 
Transactions and Code Sets Rule issued on August 17, 2000 (65 FR 50312) 
and was included in the definitions at Sec.  162.103. That definition 
was subsequently revised and moved to Sec.  160.103. The purpose of 
that revision was to clarify that the physical movement of electronic 
media from place to place is not limited to magnetic tape, disk, or 
compact disk, so as to allow for future technological innovation. We 
further clarified that transmission of information not in electronic 
form before the transmission (e.g., paper or voice) is not covered by 
this definition. See 68 FR 8339, Feb. 20, 2003.
    In the NPRM, we proposed to revise the definition of ``electronic 
media'' in the following ways. First, we proposed to revise paragraph 
(1) of the definition to replace the term ``electronic storage media'' 
with ``electronic storage material'' to conform the definition of 
``electronic media'' to its current usage, as set forth in the National 
Institute for Standards and Technology (NIST) ``Guidelines for Media 
Sanitization'' (Definition of Medium, NIST SP 800-88, Glossary B, p. 27 
(2006)). The NIST definition, which was updated subsequent to the 
issuance of the Privacy and Security Rules, was developed in 
recognition of the likelihood that the evolution of the development of 
new technology would make use of the term ``electronic storage media'' 
obsolete in that there may be ``storage material'' other than ``media'' 
that house electronic data. Second, we proposed to add to paragraph (2) 
of the definition of ``electronic media'' a reference to intranets, to 
clarify that intranets come within the definition. Third, we proposed 
to change the word ``because'' to ``if'' in the final sentence of 
paragraph (2) of the definition of ``electronic media.'' The definition 
assumed that no transmissions made by voice via telephone existed in 
electronic form before transmission; the evolution of technology has 
made this assumption obsolete since some voice technology is digitally 
produced from an information system and transmitted by phone.
Overview of Public Comments
    The Department received comments in support of the revised 
definition and the flexibility created to account for later 
technological developments. Certain other commenters raised concerns 
that changes to the definition could have unintended impacts when 
applied to the administrative transaction and code set requirements. 
One commenter specifically supported the change in language from 
``because'' to ``if,'' noting the distinction was important to provide 
protection for digital audio recordings containing protected health 
information. One commenter suggested including the

[[Page 5576]]

word ``immediately'' in the final sentence of paragraph (2) to indicate 
that fax transmissions are excluded from the definition of electronic 
media if the information being exchanged did not exist in electronic 
form immediately before the transmission. Several commenters sought 
clarification as to whether data that is retained in office machines, 
such as facsimiles and photocopiers, is subject to the Privacy and 
Security Rules.
Final Rule
    The final rule adopts the definition as proposed with two 
additional modifications. First, in paragraph (2) we remove the 
parenthetical language referring to ``wide open'' with respect to the 
Internet and ``using Internet technology to link a business with 
information accessible only to collaborating parties'' with respect to 
extranets and intranets. The parenthetical language initially helped 
clarify what was intended by key words within the definition. As these 
key words have become more generally understood and guidance has become 
available through the NIST regarding specific key terms, such as 
intranet, extranet, and internet, (see, for example, NIST IR 7298 
Revision 1, Glossary of Key Information Security Terms, February 2011, 
available at https://csrc.nist.gov/publications/nistir/ir7298-rev1/nistir-7298-revision1.pdf), we believe the parenthetical language is no 
longer helpful. Second, we do accept the recommendation that we alter 
the language in paragraph (2) to include the word ``immediately,'' to 
exclude transmissions when the information exchanged did not exist in 
electronic form immediately before transmission. This modification 
clarifies that a facsimile machine accepting a hardcopy document for 
transmission is not a covered transmission even though the document may 
have originated from printing from an electronic file.
    We do not believe these changes will have unforeseen impacts on the 
application of the term in the transactions and code sets requirements 
at Part 162.
    In response to commenters' concerns that photocopiers, facsimiles, 
and other office machines may retain electronic data, potentially 
storing protected health information when used by covered entities or 
business associates, we clarify that protected health information 
stored, whether intentionally or not, in photocopier, facsimile, and 
other devices is subject to the Privacy and Security Rules. Although 
such devices are not generally relied upon for storage and access to 
stored information, covered entities and business associates should be 
aware of the capabilities of these devices to store protected health 
information and must ensure any protected health information stored on 
such devices is appropriately protected and secured from inappropriate 
access, such as by monitoring or restricting physical access to a 
photocopier or a fax machine that is used for copying or sending 
protected health information. Further, before removal of the device 
from the covered entity or business associate, such as at the end of 
the lease term for a photocopier machine, proper safeguards should be 
followed to remove the electronic protected health information from the 
media.
c. Definition of ``Protected Health Information''
Proposed Rule
    For consistency with the proposed modifications to the period of 
protection for decedent information at Sec.  164.502(f) (discussed 
below), the Department proposed to modify the definition of ``protected 
health information'' at Sec.  160.103 to provide that the Privacy and 
Security Rules do not protect the individually identifiable health 
information of persons who have been deceased for more than 50 years.
Overview of Public Comment
    The public comments received on this proposal are discussed and 
responded to below in the section describing the modifications to Sec.  
164.502(f).
Final Rule
    For the reasons stated in the section regarding Sec.  164.502(f), 
the final rule adopts the proposed modification to the definition of 
``protected health information.''
d. Definition of ``State''
Proposed Rule
    The HITECH Act at section 13400 includes a definition of ``State'' 
to mean ``each of the several States, the District of Columbia, Puerto 
Rico, the Virgin Islands, Guam, American Samoa, and the Northern 
Mariana Islands.'' This definition varies from paragraph (2) of the 
HIPAA definition of ``State'' at Sec.  160.103, which does not include 
reference to American Samoa and the Northern Mariana Islands. Thus, for 
consistency with the definition applied to the HIPAA Rules by the 
HITECH Act, we proposed to add reference to American Samoa and the 
Commonwealth of the Northern Mariana Islands in paragraph (2) of the 
definition of ``State'' at Sec.  160.103.
Final Rule
    The Department did not receive substantive public comment on this 
proposal and the final rule adopts the proposed modifications to the 
definition of ``State.''
e. Other Changes to the Definitions in Section 160.103
    In addition to the changes discussed above, the final rule makes 
the following changes as proposed in the NPRM to various definitions in 
Sec.  160.103:
    (1) Relocates the definitions of ``administrative simplification 
provision,'' ``ALJ,'' ``civil money penalty,'' ``respondent,'' and 
``violation or violate'' from Sec.  160.302 to Sec.  160.103 for ease 
of reference;
    (2) Adds a reference to sections 13400-13424 of the HITECH Act to 
the definition of ``administrative simplification provision'';
    (3) Removes a comma from the definition of ``disclosure'' 
inadvertently inserted into the definition in a prior rulemaking;
    (4) Replaces the term ``individually identifiable health 
information'' with ``protected health information'' in the definition 
of ``standard'' to better reflect the scope of the Privacy and Security 
Rules;
    (5) Adds a reference to ``business associate'' following the 
reference to ``covered entity'' in the definitions of ``respondent'' 
and ``compliance date,'' in recognition of the potential liability 
imposed on business associates for violations of certain provisions of 
the Privacy and Security Rules by sections 13401 and 13404 of the Act; 
and
    (6) Revises the definition of ``workforce member'' in Sec.  160.103 
to make clear that the term includes the employees, volunteers, 
trainees, and other persons whose conduct, in the performance of work 
for a business associate, is under the direct control of the business 
associate, because some provisions of the Act and the Privacy and 
Security Rules place obligations on the business associate with respect 
to workforce members.
4. Subpart B--Preemption of State Law
a. Section 160.201--Statutory Basis
Proposed Rule
    We proposed to modify Sec.  160.201 regarding the statutory basis 
for the preemption of State law provisions to add a reference to 
section 264(c) of HIPAA, which contains the statutory basis for the 
exception to preemption at Sec.  160.203(b) for State laws that are 
more stringent than the HIPAA Privacy Rule. We also proposed to add a 
reference to

[[Page 5577]]

section 13421(a) of the HITECH Act, which applies HIPAA's preemption 
rules to the HITECH Act's privacy and security provisions. Finally, we 
proposed to re-title the provision to read ``Statutory basis'' instead 
of ``Applicability.''
Overview of Public Comments
    Several commenters expressed concerns about the lack of uniform 
Federal and State privacy laws and the resultant confusion and expense 
associated with determining which laws apply to a given circumstance, 
particularly as more and more health care entities operate across 
multiple state lines. Commenters recommended that the Department make 
efforts to engage States and other partners to examine divergent 
Federal and State requirements and to attempt to coordinate various 
disclosure rules to drive Federal-State consensus.
Final Rule
    The final rule adopts the proposed modifications. In response to 
the comments concerned with the lack of uniform Federal and State 
privacy laws, we note that the preemption provisions of the HIPAA Rules 
are based on section 1178 of the Social Security Act and section 
264(c)(2) of HIPAA. Through these statutory provisions, Congress made 
clear that the HIPAA privacy requirements are to supersede only 
contrary provisions of State law, and not even in all such cases, such 
as where the provision of State law provides more stringent privacy 
protections than the HIPAA Privacy Rule. Accordingly, the HIPAA Privacy 
Rule provides a Federal floor of privacy protections, with States free 
to impose more stringent privacy protections should they deem 
appropriate.
b. Section 160.202--Definitions
i. Definition of ``Contrary''
Proposed Rule
    The term ``contrary'' is defined in Sec.  160.202 to make clear 
when the preemption provisions of HIPAA apply to State law. For the 
reasons set forth on page 40875 of the July 2010 NPRM, we proposed to 
amend the definition of ``contrary'' by inserting references to 
business associates in paragraph (1) of the definition. We also 
expanded the reference to the HITECH statutory provisions in paragraph 
(2) of the definition to encompass all of the sections of subtitle D of 
the HITECH Act, rather than merely to section 13402, which was added by 
the breach notifications interim final rule. These changes would give 
effect to section 13421(a).
Final Rule
    The Department did not receive substantive public comment on this 
proposal. The final rule adopts the proposed modifications.
ii. Definition of ``More Stringent''
Proposed Rule
    The term ``more stringent'' is part of the statutory preemption 
language under HIPAA. HIPAA preempts State law that is contrary to a 
HIPAA privacy standard unless, among other exceptions, the State law is 
more stringent than the contrary HIPAA privacy standard. We proposed to 
amend the definition to add a reference to business associates.
Final Rule
    The Department did not receive substantive public comment on this 
proposal. The final rule adopts the proposed modification.

B. Subparts C and D of Part 160: Amendments to the Enforcement Rule

    Section 13410 of the HITECH Act made several amendments to the 
Social Security Act to strengthen the HIPAA Enforcement Rule, which 
applies to the Secretary's enforcement of all of the HIPAA 
Administrative Simplification Rules, as well as the Breach Notification 
Rule.
    On October 30, 2009, the Department issued an interim final rule 
(IFR) revising the Enforcement Rule to incorporate the provisions of 
section 13410(d) of the HITECH Act that took effect immediately to 
apply to violations of the HIPAA Rules occurring after the enactment 
date of February 18, 2009. See 74 FR 56123. In general, section 
13410(d) of the HITECH Act revised section 1176(a) of the Social 
Security Act to establish four categories of violations that reflect 
increasing levels of culpability and four corresponding tiers of 
penalty amounts that significantly increased the minimum penalty amount 
for each violation, with a maximum penalty amount of $1.5 million 
annually for all violations of an identical provision. Section 13410(d) 
also amended section 1176(b) of the Social Security Act by removing the 
previous affirmative defense to the imposition of penalties if the 
covered entity did not know and with the exercise of reasonable 
diligence would not have known of the violation (these violations are 
now punishable under the lowest tier of penalties), and by providing a 
prohibition on the imposition of penalties for any violation that is 
timely corrected, as long as the violation was not due to willful 
neglect. The IFR updated the HIPAA Enforcement Rule to reflect these 
statutory amendments. The IFR did not make amendments with respect to 
those enforcement provisions of section 13410 of the HITECH Act that 
were not effective immediately upon enactment.
    In its July 2010 NPRM, the Department proposed a number of 
additional modifications to the Enforcement Rule to reflect other 
provisions of section 13410 of the HITECH Act, some of which became 
effective on February 18, 2010, or were to become effective at a later 
date: (1) Requiring that the Secretary formally investigate complaints 
indicating violations due to willful neglect, and impose civil money 
penalties upon finding violations due to willful neglect; (2) making 
business associates of covered entities directly liable for civil money 
penalties for violations of certain provisions of the HIPAA Rules; (3) 
requiring the Secretary to determine civil money penalty amounts based 
upon the nature and extent of the harm resulting from a violation; and 
(4) providing that the Secretary's authority to impose a civil money 
penalty will be barred only to the extent a criminal penalty has been 
imposed with respect to an act under Section 1177, rather than in cases 
in which the act constitutes an offense that is criminally punishable 
under Section 1177.
    The following discussion describes the enforcement provisions of 
the IFR and the NPRM, responds to public comment received by the 
Department on both rules, and describes the final modifications to the 
Enforcement Rule adopted by this final rule. In addition to the 
modifications discussed below, this final rule also adopts the NPRM 
proposal to add the term ``business associate'' to the following 
provisions of the Enforcement Rule: Sec. Sec.  160.300; 160.304; 
160.306(a) and (c); 160.308; 160.310; 160.312; 160.316; 160.401; 
160.402; 160.404(b); 160.406; 160.408(c) and (d); and 160.410(a) and 
(c). This is done to implement sections 13401 and 13404 of the Act, 
which impose direct civil money penalty liability on business 
associates for their violations of certain provisions of the HIPAA 
Rules.

[[Page 5578]]

1. Subpart C of Part 160--Compliance and Investigations
a. Sections 160.304, 160.306, 160.308, and 160.312--Noncompliance Due 
to Willful Neglect
Proposed Rule
    Section 13410(a) of the HITECH Act adds a new subsection (c) to 
section 1176 of the Social Security Act, which requires the Department 
to formally investigate a complaint if a preliminary investigation of 
the facts of the complaint indicates a possible violation due to 
willful neglect (section 1176(c)(2)) and to impose a civil money 
penalty for a violation due to willful neglect (section 1176(c)(1)). 
The Department proposed a number of modifications to Subpart C of the 
Enforcement Rule to implement these provisions.
    First, Sec.  160.306(c) of the Enforcement Rule currently provides 
the Secretary with discretion to investigate HIPAA complaints through 
the use of the word ``may.'' As a practical matter, however, the 
Department currently conducts a preliminary review of every complaint 
received and proceeds with the investigation in every eligible case 
where its preliminary review of the facts indicates a possible 
violation of the HIPAA Rules. Nonetheless, to implement section 
1176(c)(2), the Department proposed to add a new paragraph (1) to Sec.  
160.306(c) (and to make conforming changes to the remainder of Sec.  
160.306(c)) to make clear that the Secretary will investigate any 
complaint filed under this section when a preliminary review of the 
facts indicates a possible violation due to willful neglect. Under 
proposed Sec.  160.306(c)(2), the Secretary would have continued 
discretion with respect to investigating any other complaints.
    Second, the Department proposed to modify Sec.  160.308 by adding a 
new paragraph (a) to provide that the Secretary will conduct a 
compliance review to determine whether a covered entity or business 
associate is complying with the applicable administrative 
simplification provision when a preliminary review of the facts 
indicates a possible violation due to willful neglect. Like Sec.  
160.306(c) with respect to complaints, the current Sec.  160.308(c) 
provides the Secretary with discretion to conduct compliance reviews. 
While section 13410(a) of the HITECH Act specifically mentions 
complaints and not compliance reviews with respect to willful neglect, 
the Department proposed to treat compliance reviews in the same manner 
because it believed doing so would strengthen enforcement with respect 
to potential violations of willful neglect and would ensure that 
investigations, whether or not initiated by a complaint, would be 
handled in a consistent manner. Under proposed Sec.  160.308(b), the 
Secretary would continue to have discretion to conduct compliance 
reviews in circumstances not indicating willful neglect.
    Third, given the HITECH Act's requirement that the Secretary impose 
a penalty for any violation due to willful neglect, the Department 
proposed changes to Sec.  160.312, which currently requires the 
Secretary to attempt to resolve investigations or compliance reviews 
indicating noncompliance by informal means. The NPRM proposed to 
provide instead in Sec.  160.312(a) that the Secretary ``may'' rather 
than ``will'' attempt to resolve investigations or compliance reviews 
indicating noncompliance by informal means. This change would permit 
the Department to proceed with a willful neglect violation 
determination as appropriate, while also permitting the Department to 
seek resolution of complaints and compliance reviews that did not 
indicate willful neglect violations by informal means (e.g., where the 
covered entity or business associate did not know and by exercising 
reasonable diligence would not have known of a violation, or where the 
violation is due to reasonable cause).
    Finally, the Department proposed a conforming change to Sec.  
160.304(a), which currently requires the Secretary to seek, to the 
extent practicable, the cooperation of covered entities in obtaining 
compliance with the HIPAA Rules. The NPRM proposed to clarify that the 
Secretary would continue to do so ``consistent with the provisions of 
this subpart'' in recognition of the new HITECH Act requirement to 
impose a civil money penalty for a violation due to willful neglect. 
While the Secretary often will still seek to correct indications of 
noncompliance through voluntary corrective action, there may be 
circumstances (such as circumstances indicating willful neglect), where 
the Secretary may proceed directly to formal enforcement.
Overview of Public Comments
    One commenter supported maintaining the current language at 
Sec. Sec.  160.306 and 160.308 of the Enforcement Rule, providing the 
Secretary with discretion to conduct complaint investigations and 
compliance reviews, regardless of indications of willful neglect. One 
commenter suggested that OCR look to whether facts indicate a 
``probable,'' rather than ``possible,'' violation due to willful 
neglect to limit the likelihood of unnecessary formal investigations or 
compliance reviews. While one commenter supported the proposal to 
require a compliance review in circumstances indicating a possible 
violation due to willful neglect, others argued that requiring 
compliance reviews in such circumstances is not required by the 
statute, will detract from resources to investigate complaints, and 
will be duplicative if a formal complaint investigation is also 
underway.
    Several commenters expressed concern over the proposal at Sec.  
160.312(a) to give the Secretary discretion, rather than to require the 
Secretary, to attempt to resolve investigations or compliance reviews 
indicating noncompliance by informal means, even in cases of 
noncompliance that did not involve willful neglect (e.g., cases 
involving reasonable cause or lack of knowledge of a violation). 
Commenters indicated support for the Department's seeking compliance 
through voluntary corrective action as opposed to formal enforcement 
proceedings and argued that the Department should retain the 
requirement for the Secretary to attempt informal resolution in all 
circumstances except those involving willful neglect. One commenter 
recommended that the Secretary be able to assess penalties regardless 
of whether corrective action was obtained.
Final Rule
    The final rule adopts the modifications to Sec. Sec.  160.304, 
160.306, 160.308, and 160.312, as proposed in the NPRM. The Department 
believes these changes to the enforcement provisions to be appropriate 
given the HITECH Act's requirements at section 13410(a) with respect to 
circumstances indicating or involving noncompliance due to willful 
neglect. We do not provide in the Rule that the Secretary will 
investigate when a preliminary review of the facts indicates a 
``probable'' rather than ``possible'' violation due to willful neglect 
as the statute requires an investigation even in cases indicating a 
``possible'' violation due to willful neglect. In response to 
commenters concerned about requiring the Secretary to conduct 
compliance reviews in circumstances in which facts indicate a possible 
violation due to willful neglect, we continue to believe that, while 
not expressly required by the statute, doing so appropriately 
strengthens enforcement with respect to violations due to willful 
neglect and ensures consistency in the handling of complaints and 
compliance reviews in

[[Page 5579]]

which violations due to willful neglect are indicated. We emphasize 
that the Department retains discretion to decide whether to conduct a 
compliance review (or complaint investigation) where a preliminary 
review of the facts indicates a degree of culpability less than willful 
neglect. Further, with respect to commenter concerns about duplication 
between complaint investigations and compliance reviews, we clarify 
that the Department generally conducts compliance reviews to 
investigate allegations of violations of the HIPAA Rules brought to the 
Department's attention through a mechanism other than a complaint. For 
example, the Department may use a compliance review to investigate 
allegations of violations of the Rules brought to our attention through 
a media report, or from a State or another Federal agency. If the 
Department initiates an investigation of a complaint because its 
preliminary review of the facts indicates a possible violation due to 
willful neglect, the Department is not also required to initiate a 
compliance review under Sec.  160.308 because doing so would initiate a 
duplicative investigation.
    With respect to Sec.  160.312, where the Rule previously mandated 
that the Secretary attempt to resolve indicated violations of the HIPAA 
Rules by informal means, the final rule now provides the Secretary with 
the discretion to do so, to reflect Section 13410 of the HITECH Act 
with regard to violations due to willful neglect. Nothing in Section 
13410 of the HITECH Act limits the Secretary's ability to resolve such 
cases by informal means. However, through its introduction of higher 
penalties and its mandate for formal investigations with regard to 
possible violations due to willful neglect, Section 13410 strengthens 
enforcement and accordingly we have revised Sec.  160.312 so that the 
Secretary may move directly to a civil money penalty without exhausting 
informal resolution efforts at her discretion, particularly in cases 
involving willful neglect violations.
Response to Other Public Comments
    Comment: A number of commenters requested further clarification on 
the scope and depth of what constitutes a ``preliminary review of the 
facts'' for purposes of determining whether facts indicate a possible 
violation due to willful neglect and thus, warrant a formal complaint 
investigation or compliance review. Certain commenters suggested that a 
preliminary review of the facts should go beyond merely a review of the 
allegations asserted in a complaint.
    Response: As noted above, currently the Department conducts a 
preliminary review of every complaint received and proceeds with the 
investigation in every eligible case where its preliminary review of 
the facts indicates a possible violation of the HIPAA Rules. The 
Department anticipates that some complaints, on their face, or reports 
or referrals that form the basis of a potential compliance review, will 
contain sufficient information to indicate a possible violation due to 
willful neglect, and some may not. In any event, the Department may on 
a case-by-case basis expand the preliminary review and conduct 
additional inquiries for purposes of identifying a possible violation 
due to willful neglect. Notwithstanding the scope of a preliminary 
review, OCR will determine if an indicated violation was due to willful 
neglect based on the evidence from its investigation of the 
allegations, even if a violation due to willful neglect was not 
indicated at the preliminary review stage.
b. Section 160.310--Protected Health Information Obtained by the 
Secretary
Proposed Rule
    Section 160.310 requires that covered entities make information 
available to and cooperate with the Secretary during complaint 
investigations and compliance reviews. Section 160.310(c)(3) provides 
that any protected health information obtained by the Secretary in 
connection with an investigation or compliance review will not be 
disclosed by the Secretary, except as necessary for determining and 
enforcing compliance with the HIPAA Rules or as otherwise required by 
law. In the proposed rule, we proposed to modify this paragraph to also 
allow the Secretary to disclose protected health information if 
permitted under the Privacy Act at 5 U.S.C. 552a(b)(7). Section 5 
U.S.C. 552a(b)(7) permits the disclosure of a record on an individual 
contained within a government system of records protected under the 
Privacy Act to another agency or instrumentality of any governmental 
jurisdiction within or under the control of the United States for a 
civil or criminal law enforcement activity if the activity is 
authorized by law and if the agency has made a written request to the 
agency that maintains the record. The proposed change would permit the 
Secretary to coordinate with other law enforcement agencies, such as 
the State Attorneys General pursuing civil actions to enforce the HIPAA 
Rules on behalf of State residents pursuant to section 13410(e) of the 
Act, or the FTC pursuing remedies under other consumer protection 
authorities.
Overview of Public Comments
    One commenter requested clarification and transparency on how or if 
Federal regulators such as OCR and the FTC will collaborate, when such 
information sharing will be initiated or occur as a routine process, or 
whether Federal and State agencies will work together to enforce 
suspected violations.
Final Rule
    To facilitate cooperation between the Department and other law 
enforcement agencies, the final rule adopts the modifications to Sec.  
160.310(c)(3) as proposed in the NPRM. In response to the comment 
regarding transparency in how the Department is or will cooperate with 
other agencies in enforcement, we note that the Department's web site 
at https://www.hhs.gov/ocr/enforcement/ contains information about how 
the Department coordinates with the Department of Justice to refer 
cases involving possible criminal HIPAA violations and how the 
Department has worked with the FTC to coordinate enforcement actions 
for violations that implicate both HIPAA and the FTC Act. Further, the 
Department will be working closely with State Attorneys General to 
coordinate enforcement in appropriate cases, as provided under section 
13410(e) of the HITECH Act. The Department will continue to update its 
web site as necessary and appropriate to maintain transparency with the 
public and the regulated community about these coordinated activities 
and its other enforcement actions and activities.
2. Subpart D--Imposition of Civil Money Penalties
a. Section 160.401--Definitions
    Section 160.401 defines ``reasonable cause,'' ``reasonable 
diligence,'' and ``willful neglect.'' Given that section 13410(d) of 
the HITECH Act uses these terms to describe the increasing levels of 
culpability for which increasing minimum levels of penalties may be 
imposed, the Department moved these definitions in the IFR from their 
prior placement at Sec.  160.410, which pertains only to affirmative 
defenses, to Sec.  160.401, so that they would apply to the entirety of 
Subpart D of Part 160 and the provisions regarding the imposition of 
civil money penalties. The IFR did not modify the definitions 
themselves as the HITECH Act did not amend the definitions.
    Even though the HITECH Act did not amend the definitions of these 
terms,

[[Page 5580]]

the Department in its NPRM proposed certain modifications to the 
definition of ``reasonable cause'' to clarify the mens rea (state of 
mind) required for this category of violations, and to avoid the 
situation where certain violations would not fall within one of the 
established penalty tiers. This modification is discussed below. The 
Department did not propose modifications to the definitions of 
``reasonable diligence'' and ``willful neglect.''
    In the NPRM, the Department also included examples and guidance as 
to how the Department planned to apply the definitions of ``reasonable 
cause,'' ``reasonable diligence,'' and ``willful neglect'' to 
distinguish among the tiers of culpability. 75 FR 40877-40879. As 
commenters generally found this guidance helpful, the Department 
intends to publish the guidance on its web site.
Modifications to the Definition of ``Reasonable Cause''
Proposed Rule
    Reasonable cause is currently defined at Sec.  160.401 to mean: 
``circumstances that would make it unreasonable for the covered entity, 
despite the exercise of ordinary business care and prudence, to comply 
with the administrative simplification provision violated.'' This 
definition is consistent with the Supreme Court's ruling in United 
States v. Boyle, 469 U.S. 241, 245 (1985), which focused on whether 
circumstances were beyond the regulated person's control, thereby 
making compliance unreasonable. See 70 FR 20224, 20238. Prior to the 
HITECH Act, section 1176 of the Social Security Act provided an 
affirmative defense to the imposition of a civil money penalty if the 
covered entity established that its violation was due to reasonable 
cause and not willful neglect and was corrected within a 30-day period 
(or such additional period determined by the Secretary to be 
appropriate).
    As described above, section 13410(d) of the HITECH Act revised 
section 1176 of the Social Security Act to establish four tiers of 
increasing penalty amounts to correspond to the levels of culpability 
associated with the violation. The first category of violation (and 
lowest penalty tier) covers situations where the covered entity or 
business associate did not know, and by exercising reasonable diligence 
would not have known, of a violation. The second category of violation 
(and next highest penalty tier) applies to violations due to reasonable 
cause and not to willful neglect. The third and fourth categories apply 
to circumstances where the violation was due to willful neglect that is 
corrected within a certain time period (second highest penalty tier) 
and willful neglect that is not corrected (highest penalty tier). The 
mens rea, or state of mind, associated with the tiers is clear with 
respect to the first, third, and fourth categories, in that there is no 
mens rea with respect to the lowest category of violation, while the 
existence of mens rea is presumed with respect to the third and fourth 
categories of violation.
    However, the current definition of ``reasonable cause'' does not 
address mens rea with respect to the second category of violations. 
Therefore, the Department proposed to amend the definition of 
``reasonable cause'' at Sec.  160.401 to clarify the mens rea 
associated with the reasonable cause category of violations and to 
clarify the full scope of violations that will come within the 
category. Specifically, the Department proposed to modify the 
definition of ``reasonable cause'' to mean ``an act or omission in 
which a covered entity or business associate knew, or by exercising 
reasonable diligence would have known, that the act or omission 
violated an administrative simplification provision, but in which the 
covered entity or business associate did not act with willful 
neglect.'' Thus, the proposed definition would now include violations 
due both to circumstances that would make it unreasonable for the 
covered entity or business associate, despite the exercise of ordinary 
business care and prudence, to comply with the administrative 
simplification provision violated, as well as to other circumstances in 
which a covered entity or business associate has knowledge of a 
violation but lacks the conscious intent or reckless indifference 
associated with the willful neglect category of violations.
Overview of Public Comments
    Commenters addressing the definition of ``reasonable cause'' 
expressed general support for the proposed clarifications to the scope 
of this category of violations.
Final Rule
    The final rule adopts the proposed modifications to the definition.
b. Section 160.402--Basis for a Civil Money Penalty
Proposed Rule
    Section 160.402(a) states generally that the Secretary will impose 
a civil money penalty upon a covered entity if the Secretary determines 
that the covered entity violated an administrative simplification 
provision. Section 164.402, in paragraphs (b) and (c), provides the 
basis for a civil money penalty against a covered entity where more 
than one covered entity is responsible for a violation, where an 
affiliated covered entity is responsible for a violation, and where an 
agent of a covered entity is responsible for a violation.
    The proposed rule proposed to remove the exception at Sec.  
160.402(c) for covered entity liability for the acts of its agent in 
cases where the agent is a business associate, the relevant contract 
requirements have been met, the covered entity did not know of a 
pattern or practice of the business associate in violation of the 
contract, and the covered entity did not fail to act as required by the 
Privacy or Security Rule with respect to such violations. The proposed 
rule also proposed to add a parallel provision in a new paragraph (2) 
at Sec.  160.402(c) that would provide for civil money penalty 
liability against a business associate for the acts of its agent. The 
existing language of Sec.  160.402(c) regarding the liability of 
covered entities for the acts of their agents would be re-designated as 
paragraph (1).
    These proposed changes would make covered entities and business 
associates liable under Sec.  160.402(c) for the acts of their business 
associate agents, in accordance with the Federal common law of agency, 
regardless of whether the covered entity has a compliant business 
associate agreement in place. Section 160.402(c) closely tracks the 
language in section 1128A(l) of the Social Security Act, which is made 
applicable to HIPAA by section 1176(a)(2) of such Act, which states 
that ``a principal is liable for penalties * * * under this section for 
the actions of the principal's agents acting within the scope of the 
agency.'' One reason for removing the exception to the general 
provision at Sec.  160.402(c), as we explained in the NPRM, is to 
ensure, where a covered entity or business associate has delegated out 
an obligation under the HIPAA Rules, that a covered entity or business 
associate would remain liable for penalties for the failure of its 
business associate agent to perform the obligation on the covered 
entity or business associate's behalf.
Overview of Public Comments
    Several commenters requested that the Department clarify and 
provide additional guidance regarding how the Federal common law of 
agency applies to business associate relationships. These commenters 
expressed an overall concern that applying the Federal common law of 
agency to business

[[Page 5581]]

associate relationships would add unnecessary confusion to and place an 
undue burden on business associate relationships. Several commenters 
argued that the proposed change would require covered entities and 
business associates to determine whether their business associates or 
business associate subcontractors are agents, resulting in costly and 
burdensome challenges when drafting business associate contracts and 
monitoring ongoing relationships. One commenter argued that the Federal 
common law of agency should not be applied to covered entity and 
business associate relationships because it does not generally control 
when the parties have entered into a contractual agreement that 
specifies their respective rights and obligations. Instead, the 
commenter argued, the contractual provisions control, and are 
interpreted and enforced in accordance with State law specified by the 
contract.
Final Rule
    This final rule adopts the proposed modifications to Sec.  
160.402(c). We do not believe that this change will place an undue 
burden on covered entities and business associates. As we explained in 
the NPRM, a covered entity's liability for acts of its agents is 
customary under common law. See 75 FR 40880. Further, section 1128A(l) 
of the Social Security Act, applicable to HIPAA covered entities and 
now business associates by section 1176(a)(2) of the Act, states that a 
principal is liable for civil money penalties for the actions of the 
principal's agent acting within the scope of agency. Before the changes 
to Sec.  160.402(c) were finalized in this rule, if a covered entity 
failed to comply with the business associate provisions in the HIPAA 
Rules, a covered entity potentially would have been liable for the 
actions of its business associate agent. Thus, we believe that the 
notion that a principal is liable for the acts of its agent should not 
be an unfamiliar concept to covered entities and business associates. 
However, we appreciate and understand the commenters' concerns and take 
this opportunity to provide additional guidance.
    While section 1128A(l) is silent as to how to define ``principal,'' 
``agent,'' and ``scope of agency,'' Sec.  160.402(c) references the 
Federal common law of agency. As we explained in the Enforcement Rule 
preamble, 71 FR 8390, 8403-04, adopting the Federal common law to 
determine the definitions and application of these terms achieves 
nationwide uniformity in the implementation of the HIPAA Rules. We 
believe that relying on the Federal common law is particularly 
important because of HIPAA's express objective of furthering the 
efficiency and effectiveness of the health care system as a whole. 
Further, adopting the Federal common law here is consistent with the 
precept that Federal statutes are meant to have uniform nationwide 
application. Therefore, we disagree with the comment that argued that 
Federal common law should not be applied with respect to relationships 
between covered entities and business associates.
    An analysis of whether a business associate is an agent will be 
fact specific, taking into account the terms of a business associate 
agreement as well as the totality of the circumstances involved in the 
ongoing relationship between the parties. The essential factor in 
determining whether an agency relationship exists between a covered 
entity and its business associate (or business associate and its 
subcontractor) is the right or authority of a covered entity to control 
the business associate's conduct in the course of performing a service 
on behalf of the covered entity. The right or authority to control the 
business associate's conduct also is the essential factor in 
determining whether an agency relationship exists between a business 
associate and its business associate subcontractor. Accordingly, this 
guidance applies in the same manner to both covered entities (with 
regard to their business associates) and business associates (with 
regard to their subcontractors).
    The authority of a covered entity to give interim instructions or 
directions is the type of control that distinguishes covered entities 
in agency relationships from those in non-agency relationships. A 
business associate generally would not be an agent if it enters into a 
business associate agreement with a covered entity that sets terms and 
conditions that create contractual obligations between the two parties. 
Specifically, if the only avenue of control is for a covered entity to 
amend the terms of the agreement or sue for breach of contract, this 
generally indicates that a business associate is not acting as an 
agent. In contrast, a business associate generally would be an agent if 
it enters into a business associate agreement with a covered entity 
that granted the covered entity the authority to direct the performance 
of the service provided by its business associate after the 
relationship was established. For example, if the terms of a business 
associate agreement between a covered entity and its business associate 
stated that ``a business associate must make available protected health 
information in accordance with Sec.  164.524 based on the instructions 
to be provided by or under the direction of a covered entity,'' then 
this would create an agency relationship between the covered entity and 
business associate for this activity because the covered entity has a 
right to give interim instructions and direction during the course of 
the relationship. An agency relationship also could exist between a 
covered entity and its business associate if a covered entity contracts 
out or delegates a particular obligation under the HIPAA Rules to its 
business associate. As discussed above, whether or not an agency 
relationship exists in this circumstance again would depend on the 
right or authority to control the business associate's conduct in the 
performance of the delegated service based on the right of a covered 
entity to give interim instructions.
    While these principles are well established under the Federal 
common law of agency, we again note that any analysis regarding scope 
of agency depends on the facts of each circumstance. Several factors 
are important to consider in any analysis to determine the scope of 
agency: (1) The time, place, and purpose of a business associate 
agent's conduct; (2) whether a business associate agent engaged in a 
course of conduct subject to a covered entity's control; (3) whether a 
business associate agent's conduct is commonly done by a business 
associate to accomplish the service performed on behalf of a covered 
entity; and (4) whether or not the covered entity reasonably expected 
that a business associate agent would engage in the conduct in 
question.
    The terms, statements, or labels given to parties (e.g., 
independent contractor) do not control whether an agency relationship 
exists. Rather, the manner and method in which a covered entity 
actually controls the service provided decides the analysis. As 
mentioned above, an analysis of whether a business associate is an 
agent will be fact specific and consider the totality of the 
circumstances involved in the ongoing relationship between the parties. 
We note here several circumstances that are important. The type of 
service and skill level required to perform the service are relevant 
factors in determining whether a business associate is an agent. For 
example, a business associate that is hired to perform de-
identification of protected health information for a small provider 
would likely not be an agent because the small provider likely would 
not have the expertise to provide interim instructions regarding this 
activity to the business associate. Also, an agency relationship would 
not likely exist when a covered entity is legally or

[[Page 5582]]

otherwise prevented from performing the service or activity performed 
by its business associate. For example, the accreditation functions 
performed by a business associate cannot be performed by a covered 
entity seeking accreditation because a covered entity cannot perform an 
accreditation survey or award accreditation. We also note that a 
business associate can be an agent of a covered entity: (1) Despite the 
fact that a covered entity does not retain the right or authority to 
control every aspect of its business associate's activities; (2) even 
if a covered entity does not exercise the right of control but evidence 
exists that it holds the authority to exercise that right; and (3) even 
if a covered entity and its business associate are separated by 
physical distance (e.g., if a covered entity and business associate are 
located in different countries).
Response to Other Public Comments
    Comment: One commenter asked whether the Department intends to 
eliminate the exceptions afforded by the Federal common law of agency. 
This commenter also argued that if a business associate were an agent 
of a covered entity, and a HIPAA compliant business associate agreement 
was in place, any deviation from the terms in the agreement would be by 
definition outside the scope of agency.
    Response: As we discussed above, Sec.  160.402(c) provides that 
covered entities and business associates are liable for the acts of 
their business associate agents, in accordance with the Federal common 
law of agency. Section 160.402(c) is derived from section 1128A(l) of 
the Social Security Act which states that ``a principal is liable for 
penalties * * * under this section for the actions of the principal's 
agents acting within the scope of the agency.'' Accordingly, Sec.  
160.402(c) incorporates the Federal common law of agency, which 
includes the understanding that for a principal to be liable for the 
actions of an agent, the agent must be acting within the scope of 
agency. Thus, the exceptions to the Federal common law of agency (as 
the commenter identified them) are incorporated in the final rule at 
Sec.  160.402(c).
    We do not agree with the commenter that any deviation from the 
terms in a business associate contract would be by definition outside 
the scope of agency. A business associate agent's conduct generally is 
within the scope of agency when its conduct occurs during the 
performance of the assigned work or incident to such work, regardless 
of whether the work was done carelessly, a mistake was made in the 
performance, or the business associate disregarded a covered entity's 
specific instruction. For example, a business associate agent would 
likely be acting within the scope of agency if it impermissibly 
disclosed more than the minimum necessary information to a health plan 
for purposes of payment, even if the disclosure is contrary to clear 
instructions of the covered entity. In contrast, a business associate 
agent's conduct generally is outside the scope of agency when its 
conduct is solely for its own benefit (or that of a third party), or 
pursues a course of conduct not intended to serve any purpose of the 
covered entity.
    Comment: One commenter stated that the proposed change would impose 
strict liability on covered entities for the actions of third parties 
not under their control. Another commenter stated that an agent would 
always fall within the scope of a workforce member, which by definition 
is not a business associate.
    Response: We disagree with both comments and believe that the 
comments may reflect a misunderstanding of the proposed change. First, 
as explained above, Sec.  160.402(c) closely tracks the language in 
section 1128A(l) of the Social Security Act, which is made applicable 
to HIPAA by section 1176(a)(2) of such Act. It does not make a covered 
entity or business associate liable for the acts of third parties that 
are not under its control because such third parties are not its 
agents. With regard to the second comment, an agent could always fall 
within the definition of a workforce member because of the direct 
control requirement in that definition, but the definition of business 
associate excludes a workforce member. This definitional exclusion 
allows the covered entity to determine whether, for example, to provide 
training to the agent under the Privacy Rule. A covered entity would be 
required to provide training to a workforce member but not to a 
business associate agent. However, the covered entity is required to 
enter into a business associate agreement with a business associate 
agent that it does not treat as a workforce member. The proposed change 
to Sec.  160.402(c) simply makes the covered entity or business 
associate liable for the acts of its agents acting within the scope of 
agency, whether the agents are workforce members or business 
associates. See the definitions of ``business associate'' and 
``workforce member'' at Sec.  160.103.
c. Section 160.404--Amount of a Civil Monetary Penalty
Interim Final Rule
    The IFR amended Sec.  160.404 to revise the range of potential 
civil money penalty amounts a covered entity (or business associate) 
will be subject to for violations occurring on or after February 18, 
2009, as a result of section 13410(d) of the HITECH Act.
    Prior to the HITECH Act, section 1176(a) of the Social Security Act 
authorized the Secretary to impose a civil money penalty of not more 
than $100 for each violation, with the total amount imposed on a 
covered entity for all violations of an identical requirement or 
prohibition during a calendar year not to exceed $25,000. As described 
above, section 13410(d) of the HITECH Act modified section 1176(a) to 
establish tiers of increasing penalty amounts for violations based on 
increasing levels of culpability associated with each tier.
    Accordingly, the IFR adopted at Sec.  160.404(b) the new penalty 
scheme provided for at section 13410(d) of the HITECH Act for 
violations occurring on or after February 18, 2009. The IFR retained 
the pre-HITECH maximum penalty amounts of not more than $100 per 
violation and $25,000 for identical violations during a calendar year, 
for violations occurring before February 18, 2009.
    In adopting the HITECH Act's penalty scheme, the Department 
recognized that section 13410(d) contained apparently inconsistent 
language (i.e., its reference to two penalty tiers ``for each 
violation,'' each of which provided a penalty amount ``for all such 
violations'' of an identical requirement or prohibition in a calendar 
year). To resolve this inconsistency, with the exception of violations 
due to willful neglect that are not timely corrected, the IFR adopted a 
range of penalty amounts between the minimum given in one tier and the 
maximum given in the second tier for each violation and adopted the 
amount of $1.5 million as the limit for all violations of an identical 
provision of the HIPAA rules in a calendar year. For violations due to 
willful neglect that are not timely corrected, the IFR adopted the 
penalty amount of $50,000 as the minimum for each violation and $1.5 
million for all such violations of an identical requirement or 
prohibition in a calendar year.
    Specifically, the IFR revised Sec.  160.404 to provide, for 
violations occurring on or after February 18, 2009, the new HITECH 
penalty scheme, as follows: (1) For violations in which it is 
established that the covered entity did not know

[[Page 5583]]

and, by exercising reasonable diligence, would not have known that the 
covered entity violated a provision, an amount not less than $100 or 
more than $50,000 for each violation; (2) for a violation in which it 
is established that the violation was due to reasonable cause and not 
to willful neglect, an amount not less than $1000 or more than $50,000 
for each violation; (3) for a violation in which it is established that 
the violation was due to willful neglect and was timely corrected, an 
amount not less than $10,000 or more than $50,000 for each violation; 
and (4) for a violation in which it is established that the violation 
was due to willful neglect and was not timely corrected, an amount not 
less than $50,000 for each violation; except that a penalty for 
violations of the same requirement or prohibition under any of these 
categories may not exceed $1,500,000 in a calendar year. See Table 2 
below.

    Table 2--Categories of Violations and Respective Penalty Amounts
                                Available
------------------------------------------------------------------------
                                                     All such violations
 Violation category--Section                           of an identical
         1176(a)(1)              Each violation        provision in a
                                                        calendar year
------------------------------------------------------------------------
(A) Did Not Know............          $100-$50,000            $1,500,000
(B) Reasonable Cause........          1,000-50,000             1,500,000
(C)(i) Willful Neglect-              10,000-50,000             1,500,000
 Corrected..................
(C)(ii) Willful Neglect-Not                 50,000             1,500,000
 Corrected..................
------------------------------------------------------------------------

    In applying these amounts, the Department will not impose the 
maximum penalty amount in all cases but rather will determine the 
penalty amounts as required by the statute at section 1176(a)(1) and 
the regulations at Sec.  160.408 (i.e., based on the nature and extent 
of the violation, the nature and extent of the resulting harm, and the 
other factors set forth at Sec.  160.408).
    Further, for counting violations, the Department continues to 
utilize the methodology discussed in prior preambles of the Enforcement 
Rule. See 70 FR 20224, 20233-55 (April 18, 2005) and 71 FR 8390, 8404-
07 (February 16, 2006). For violations that began prior to February 18, 
2009, and continue after that date, the Department will treat 
violations occurring before February 18, 2009, as subject to the 
penalties in effect prior to February 18, 2009, and violations 
occurring on or after February 18, 2009, as subject to the penalties in 
effect on or after February 18, 2009.
Overview of Public Comments
    Most comments on the civil money penalty amounts expressed concern 
with the new penalty structure set forth in the IFR. A few of these 
commenters expressed a generalized concern about the potential impact 
the available penalty amounts might have on covered entities, 
particularly smaller entities. One commenter argued that the Secretary 
should not fine entities for violations of which a covered entity had 
no knowledge or those due to reasonable cause, and that civil money 
penalties should only be imposed as a last resort. A few commenters 
expressed concern with the Secretary's wide range of discretion in 
determining a civil money penalty amount and suggested that the 
regulations or guidance should further define how the Secretary would 
determine such an amount.
    Some commenters specifically expressed concern about the maximum 
penalty amounts set forth for each violation (i.e., $50,000) and for 
all violations of an identical provision in a calendar year 
($1,500,000). Commenters argued that the IFR's penalty scheme is 
inconsistent with the HITECH Act's establishment of different tiers 
based on culpability because the outside limits were the same for all 
culpability categories and this ignored the outside limits set forth by 
the HITECH Act within the lower penalty tiers, rendering those limits 
meaningless. A few commenters expressed particular concern with what 
they believed to be the unfair ability of the Secretary to impose the 
maximum penalty amounts to violations falling within the two lowest 
categories of culpability (i.e., did not know violations and violations 
due to reasonable cause and not willful neglect).
Final Rule
    This final rule retains the revised penalty structure in Sec.  
160.404(b) as implemented by the IFR. We continue to believe the 
penalty amounts are appropriate and reflect the most logical reading of 
the HITECH Act, which provides the Secretary with discretion to impose 
penalties for each category of culpability up to the maximum amount 
described in the highest penalty tier.
    With respect to those comments expressing concern about the 
discretion available to the Secretary under the adopted scheme we 
emphasize again that the Department will not impose the maximum penalty 
amount in all cases but will rather determine the amount of a penalty 
on a case-by-case basis, depending on the nature and extent of the 
violation and the nature and extent of the resulting harm, as required 
by the HITECH Act, as well as the other factors set forth at Sec.  
160.408. In response to those commenters particularly concerned about 
the impact of penalties on smaller entities, we note that the other 
factors include both the financial condition and size of the covered 
entity or business associate. These factors are discussed more fully 
below.
    In addition, with respect to comments expressing specific concern 
about fairness regarding those violations of which an entity did not 
know or by exercising reasonable diligence would not have known or for 
which there was a reasonable cause and not willful neglect, we note 
that in both cases an entity may establish that an affirmative defense 
applies under Sec.  160.410, where the entity corrects the violation 
within 30 days from the date the entity had knowledge of the violation 
or with the exercise of reasonable diligence would have had knowledge 
of the violation, or during a period determined appropriate by the 
Secretary based upon the nature and extent of the entity's failure to 
comply. These affirmative defenses are described more fully below.
    In addition, Section 13410(d) of the HITECH Act and Section 1176(a) 
of the Social Security Act, give the Secretary further ability to waive 
a civil money penalty, in whole or in part, under certain 
circumstances. Thus, to the extent an entity fails to correct such 
violations within the mandated timeframe, the Secretary may also 
utilize her waiver authority provided for at Sec.  160.412, to waive 
the penalty amount in whole or in part, to the extent that payment of 
the penalty would be excessive relative to the violation.
    Further, pursuant to 42 U.S.C. 1320a-7a(f), the Secretary always 
has the discretion to settle any issue or case or to compromise the 
amount of a civil money penalty assessed for a violation of the HIPAA 
Rules.

[[Page 5584]]

    Finally, in the event an entity believes that a civil money penalty 
has been imposed unfairly, the entity could exercise its right under 
Sec.  160.504 to appeal the imposition of a civil money penalty in a 
hearing before an administrative law judge.
Response to Other Public Comments
    Comment: We received a few comments in response to the IFR and NPRM 
requesting clarification as to how the Secretary will count violations 
for purposes of calculating civil money penalties. One commenter 
requested clarification as to how the numbers of ``occurrences'' are 
determined, suggesting that penalties could be very significant, and 
vary significantly, depending on the counting methodology utilized. The 
Department also received one comment asking whether a violation is 
defined as one event. This commenter queried, for example, whether the 
loss of unsecured electronic media would be considered as a single 
violation, even if the media contained several hundred records. The 
commenter also asked for confirmation that $1,500,000 is the aggregate 
limit of all fines for all violations in a given calendar year which 
would apply across an entire enterprise, regardless of violations 
occurring in different business units.
    Response: How violations are counted for purposes of calculating a 
civil money penalty vary depending on the circumstances surrounding the 
noncompliance. Generally speaking, where multiple individuals are 
affected by an impermissible use or disclosure, such as in the case of 
a breach of unsecured protected health information, it is anticipated 
that the number of identical violations of the Privacy Rule standard 
regarding permissible uses and disclosures would be counted by the 
number of individuals affected. Further, with respect to continuing 
violations, such as lack of appropriate safeguards for a period of 
time, it is anticipated that the number of identical violations of the 
safeguard standard would be counted on a per day basis (i.e., the 
number of days the entity did not have appropriate safeguards in place 
to protect the protected health information). Note also that in many 
breach cases, there will be both an impermissible use or disclosure, as 
well as a safeguards violation, for each of which the Department may 
calculate a separate civil money penalty. We refer readers to prior 
Enforcement Rule preambles for additional discussion on the counting 
methodology. See 70 FR 20224, 20233-55 (April 18, 2005) and 71 FR 8390, 
8404-07 (February 16, 2006).
    With respect to whether the aggregate CMP limit of $1.5 million 
would apply to all violations in a given calendar year, across an 
entire enterprise, regardless of violations occurring in different 
business units of the enterprise, we note that the Enforcement Rule's 
penalty scheme, and thus the limit for identical violations in a 
calendar year applies to the legal entity that is a covered entity or 
business associate. However, as we indicated above, a covered entity or 
business associate may be liable for multiple violations of multiple 
requirements, and a violation of each requirement may be counted 
separately. As such, one covered entity or business associate may be 
subject to multiple violations of up to a $1.5 million cap for each 
violation, which would result in a total penalty above $1.5 million.
d. Section 160.408--Factors Considered in Determining the Amount of a 
Civil Money Penalty
Proposed Rule
    Section 160.408 implements section 1176(a)(2) of the Social 
Security Act, which requires the Secretary, when imposing a civil money 
penalty, to apply the provisions of section 1128A of the Social 
Security Act ``in the same manner as such provisions apply to the 
imposition of a civil money penalty under section 1128A.'' In 
determining a penalty amount, section 1128A requires the Secretary to 
take into account the nature of the claims and the circumstances under 
which they were presented; the degree of culpability, history of prior 
offenses and financial condition of the person presenting the claims; 
and such other matters as justice may require.
    Section 160.408 adopted these factors and provided a more specific 
list of circumstances within each. Because the Enforcement Rule applies 
to a number of rules, which apply to an enormous number of entities and 
circumstances, the Secretary has the discretion to decide whether and 
how to consider the factors (i.e., as either aggravating or mitigating) 
in determining the amount of a civil money penalty.
    As previously indicated, section 13410(d) of the HITECH Act 
modified section 1176(a)(1) of the Social Security Act to require that 
the Department base determinations of appropriate penalty amounts on 
the nature and extent of the violation and the nature and extent of the 
harm resulting from such violation. However, the HITECH Act did not 
modify section 1176(a)(2),which continues to require application of the 
factors in section 1128A.
    The proposed rule proposed to revise the structure and list of 
factors at Sec.  160.408 to make explicit the new HITECH Act 
requirement that the Secretary consider the nature and extent of the 
violation and the nature and extent of the harm resulting from the 
violation, in addition to those factors enumerated in section 1128A. We 
proposed to exclude, however, the factor at Sec.  160.408(c) regarding 
the degree of culpability of the covered entity, which originated in 
section 1128A, because culpability is now reflected in the penalty 
tiers.
    Specifically, the Department proposed to revise Sec.  160.408(a) to 
identify ``the nature and extent of the violation,'' ``the nature and 
extent of the harm resulting from the violation,'' and the ``history of 
prior compliance with the administrative simplification provision, 
including violations by the covered entity or business associate,'' the 
``financial condition of the covered entity or business associate,'' 
and ``such other matters as justice may require,'' as the five general 
factors the Secretary will consider in determining a civil money 
penalty. Under each of these categories, we proposed to reorganize and 
list the specific factors that may be considered.
    In addition, in the first, second, and third factors, we proposed 
to add certain circumstances which may be considered in determining a 
penalty amount. Under the first factor, we proposed to add ``the number 
of individuals affected'' as relevant to the extent of a violation. 
Under the second factor, we proposed to add ``reputational harm'' to 
the specific circumstances which may be considered, to make clear that 
reputational harm is as cognizable a form of harm as physical or 
financial harm. Finally, in the third factor, the Department proposed 
to modify the phrase ``prior violations'' to ``indications of 
noncompliance,'' because use of the term ``violation'' is generally 
reserved for instances where the Department has made a formal finding 
of a violation through a notice of proposed determination. However, a 
covered entity's general history of HIPAA compliance is relevant in 
determining the amount of a civil money penalty within the penalty 
range.
    The Department did not propose to modify the Secretary's discretion 
in how to apply the factors--i.e., as either mitigating or aggravating.
Overview of Public Comments
    We received one comment requesting that the Department limit the 
number of mitigating factors it will consider when determining penalty 
amounts and apply

[[Page 5585]]

civil money penalties in every case of noncompliance, including where 
resolution and compliance have been achieved by informal means. The 
commenter also argued that a covered entity's or business associate's 
financial condition or financial difficulties should not be considered 
as mitigating factors in determining the amount of civil money 
penalties. The commenter recommended that penalties should apply to all 
violators except those who despite due diligence could not discover the 
violation, who reported the violation immediately, and who fully 
corrected the problem within 30 days of discovery.
    We received two comments in support of considering reputational 
harm in the computation of civil money penalties. One commenter 
emphasized that reputational harm addresses harm to individuals' 
dignity interest and recommended the inclusion of ``other'' harm as 
well. However, another covered entity expressed concern that damages 
for reputational harm are difficult to quantify and, therefore, claims 
might lead to protracted litigation and expensive settlements, 
ultimately increasing the costs of health care. Finally, we received 
one comment requesting examples of situations involving a cognizable 
claim of reputational harm.
    We also received several comments requesting that the Department 
continue to consider the degree of culpability when determining the 
amount of a civil money penalty. One commenter specifically recommended 
that the Department consider whether unauthorized access has occurred 
when determining civil money penalty amounts. We also received one 
comment suggesting that the Department revise proposed Sec.  160.408(c) 
to recognize as a mitigating factor whether the current violation is 
inconsistent with an entity's prior history of compliance.
    With respect to the evaluation of a covered entity's or business 
associate's history of prior compliance, we received a number of 
comments expressing concern that replacing ``violations'' with 
``indications of noncompliance'' would create ambiguity, and would not 
adequately inform covered entities and business associates of the 
factors that the Department will consider when determining civil money 
penalty amounts. The commenters expressed concern that expanding the 
evaluation of prior compliance beyond documented, formal findings of 
noncompliance would permit the Department to rely on information of 
dubious credibility. Commenters requested that, to prevent uncertainty, 
the Department either retain the term ``violations'' or provide a clear 
definition, including examples, of ``indications of noncompliance.''
    Finally, we received several comments requesting additional 
examples and guidance on how the Department will apply the factors in 
assessing penalty amounts.
Final Rule
    The final rule adopts the proposed modifications. We do not 
eliminate the factors concerning an entity's financial condition, as 
such factors are based on the requirement in section 1128A(d) of the 
Social Security Act. We emphasize that the goal of enforcement is to 
ensure that violations do not recur without impeding access to care. 
Further, we note that an entity's financial condition can affect a 
civil money penalty in either direction, that is, while an entity in 
poor financial condition may face a lesser penalty if its financial 
condition affected its ability to comply, an entity with greater 
financial resources could be subject to higher penalties for 
violations, in part because it had the resources to maintain 
compliance.
    When considering the nature of the violation, the Department 
intends to consider factors such as the time period during which the 
violation(s) occurred and the number of individuals affected. Such 
considerations reflect the nature of the violation, specifically with 
respect to potential violations that affect a large number of 
individuals, for example, where disclosure of protected health 
information in multiple explanation of benefits statements (EOBs) that 
were mailed to the wrong individuals resulted from one inadequate 
safeguard but affected a large number of beneficiaries. However, we do 
recognize that these specific circumstances might also be considered 
under Sec.  160.406, with respect to counting violations. See 71 FR 
8390, 8409.
    Whether reputational harm is implicated in a HIPAA violation will 
be a fact-specific inquiry. We emphasize, however, that we do not 
consider reputational harm to arise solely from the unlawful disclosure 
of protected health information relating to medical diagnoses that may 
be considered especially sensitive, such as sexually transmitted 
infections or mental health disorders. Rather, the facts of the 
situation will determine whether reputational harm has occurred, such 
as whether the unlawful disclosure resulted in adverse effects on 
employment, standing in the community, or personal relationships. With 
respect to requests to consider ``other'' harm or whether unauthorized 
access has occurred, we reiterate that, in determining the nature and 
extent of the harm involved, we may consider all relevant factors, not 
just those expressly included in the text of the regulation.
    Regarding the shift in terminology from ``history of violations'' 
to ``prior indications of noncompliance,'' we note that use of the 
terms ``violation'' or ``violate'' generally indicates that the 
Department has made a formal finding of a violation through a notice of 
proposed determination. Because the Department has a number of 
enforcement tools, such as informal resolution through a corrective 
action plan, the number of ``violations'' incurred by a covered entity 
or business associate does not constitute an accurate picture of a 
covered entity's or business associate's general history of compliance 
with all HIPAA Rules, which is relevant in determining the amount of a 
civil money penalty within the penalty range. See 71 FR 8390, 8408. As 
such, the Department modified the provision to reflect the Department's 
policy of considering the covered entity's or business associate's 
general history of compliance with the HIPAA Rules when determining a 
civil money penalty.
    With regard to the phrase ``indications of noncompliance,'' we 
first clarify that a mere complaint does not constitute an indication 
of noncompliance. Instead, prior indications of noncompliance may refer 
to the number of times the Department has investigated an entity in the 
past and discovered indications of noncompliance that the Department 
resolved by informal means, such as satisfactory corrective action 
voluntarily taken by the covered entity. Finally, we agree that an 
entity's history of compliance--not only a history of noncompliance--is 
important, and will consider such a factor.
e. Section 160.410--Affirmative Defenses
Interim Final Rule and Proposed Rule
    As noted above, the IFR made changes to the affirmatives defenses 
found in the Enforcement Rule at Sec.  160.410 to implement the 
modifications to section 1176(b) of the Social Security Act made by 
section 13410(d) of the HITECH Act. Specifically, the IFR removed the 
previous affirmative defense to the imposition of penalties if the 
covered entity did not know and with the exercise of reasonable 
diligence would not have known of the violation (since such violations 
are now punishable under the lowest tier of penalties), and by 
providing a prohibition on the

[[Page 5586]]

imposition of penalties for any violation that is corrected within a 
30-day time period, as long as the violation was not due to willful 
neglect.
    The proposed rule included additional modifications to Sec.  
160.410 to conform to the changes made to section 1176(b) by the HITECH 
Act. Specifically, we proposed to implement the revision of section 
1176(b)(1) of the Social Security Act by providing in Sec.  
160.410(a)(1) and (2) that the affirmative defense of criminally 
``punishable'' is applicable to penalties imposed prior to February 18, 
2011, and on or after February 18, 2011, the Secretary's authority to 
impose a civil money penalty will only be barred to the extent a 
covered entity or business associate can demonstrate that a criminal 
penalty has been imposed. Additionally, the Department also proposed 
modifications to the affirmative defenses in Sec.  160.410 for 
violations occurring prior to February 18, 2009, to ensure the prior 
definition of ``reasonable cause'' continued to apply in such 
circumstances and avoiding any potential issues regarding a retroactive 
application of the revised term.
Final Rule
    The final rule adopts the proposed modifications to Sec.  160.410. 
The Department did not receive any comments in response to the NPRM's 
proposed revisions to this section.
f. Section 160.412--Waiver
    Prior to February 18, 2009, Sec.  160.412 stated that ``[f]or 
violations described in Sec.  160.410(b)(3)(i) that are not corrected 
within the period described in Sec.  160.410(b)(3)(ii), the Secretary 
may waive the civil money penalty, in whole or in part, to the extent 
that payment of the penalty would be excessive relative to the 
violation.'' This language implicitly recognized a covered entity's 
ability to claim an affirmative defense to the imposition of a civil 
money penalty, under what was then Sec.  160.410(b)(2), by establishing 
that it did not have knowledge of the violation, determined in 
accordance with the Federal common law of agency, and by exercising 
reasonable diligence, would not have known that the violation occurred. 
While section 13410(d) of the HITECH Act revised section 1176(b) of the 
Social Security Act to eliminate the affirmative defense for such 
violations, absent corrective action during a 30-day period, it did not 
revise the Secretary's waiver authority. As a result, the Enforcement 
IFR amended Sec.  160.412 to reflect the revisions made to Sec.  
160.410 to provide that ``[r]egardless of whether violations occur 
before, on, or after February 18, 2009, the Secretary had the authority 
to provide a waiver for violations due to reasonable cause and not 
willful neglect that are not timely corrected (pursuant to the 
correction period in revised Sec.  160.410(a)(3)(ii) or (b)(2)(ii), as 
applicable).'' See 74 FR 56129.
    The proposed rule included conforming changes to Sec.  160.412 to 
align the provision with the revisions to Sec.  160.410. See 75 FR 
40881. The proposed revision would effectively provide the Secretary 
with the authority to waive a civil money penalty, in whole or in part, 
for violations described in Sec.  160.410(b)(2) (occurring prior to 
February 18, 2009, and due to circumstances that would make it 
unreasonable for the covered entity, despite the exercise of ordinary 
business care and prudence, to comply with the administrative 
simplification provision violated) or Sec.  160.410(c) (occurring on or 
after February 18, 2009, and involving an establishment to the 
satisfaction of the Secretary that the violation is not due to willful 
neglect) and that are not corrected within the period specified under 
such paragraphs.
Overview of Public Comments
    The Department received a few comments in response to the IFR 
regarding the Secretary's authority to waive the imposition of a civil 
money penalty for violations occurring on or after February 18, 2009, 
each of which urged that the Secretary's waiver authority be extended 
to apply also to penalties for violations of which a covered entity did 
not know, or through the exercise of reasonable diligence, would not 
have known, in addition to reasonable cause violations, because ``did 
not know'' violations are a less culpable category of violation than 
reasonable cause violations.
Final Rule
    The final rule adopts the modifications to Sec.  160.412 proposed 
in the NPRM, which addresses the concerns of the above commenters on 
the IFR.
g. Section 160.418--Penalty Not Exclusive
Proposed Rule
    We proposed to revise this section to incorporate a reference to 
the provision of PSQIA at 42 U.S.C. 299b-22 that provides that 
penalties are not to be imposed under both PSQIA and the HIPAA Privacy 
Rule for the same violation.
Final Rule
    The Department did not receive substantive public comment on this 
proposal. The final rule adopts the proposed modification to Sec.  
160.418.
h. Section 160.420--Notice of Proposed Determination
Interim Final Rule
    The Enforcement IFR also amended Sec.  160.420(a)(4) to add the 
requirement that, in addition to the proposed penalty amount, the 
Secretary identify in a notice of proposed determination the applicable 
violation category in Sec.  160.404 upon which the proposed penalty 
amount is based. While not statutorily required, the Enforcement IFR 
included this amendment to provide covered entities and business 
associates with additional information that would increase their 
understanding of the violation findings in the notice of proposed 
determination.
Overview of Public Comment
    The Department received three comments supporting this amendment.
Final Rule
    The final rule retains the provision as modified in the IFR.
i. Calculation of the 30-Day Cure Period for Willful Neglect Violations
Interim Final Rule
    In its discussion of the HITECH Act's revision of affirmative 
defenses, the Department noted that section 1176(b)(2)(A) of the Social 
Security Act still operates to exclude violations due to willful 
neglect from those that, if timely corrected, would be exempt from the 
Secretary's imposition of a civil money penalty. However, a covered 
entity's timely action to correct still would be determinative with 
respect to which of the two tiers of willful neglect penalty amounts 
would apply. To determine the appropriate penalty tier for such 
violations, the Department stated it would calculate the 30-day cure 
period in the same manner as described for determining whether an 
affirmative defense applied. That is, the Department would look at when 
a covered entity first had actual or constructive knowledge of a 
violation due to willful neglect, based on evidence gathered during its 
investigation, on a case-by-case basis. See 74 FR 56128 (October 30, 
2009), 70 FR 20224, 20237-8 (April 18, 2005) and 71 FR 8390, 8410 
(February 16, 2006) for prior, more detailed discussions about the 
Department's determination of when knowledge exists.

[[Page 5587]]

    Because the Department recognized that the minimum penalty amount 
under the HITECH Act of a violation due to willful neglect that is 
corrected during the 30-day cure period is significantly less than that 
for a violation due to willful neglect that is not timely corrected 
(equating to a $40,000 minimum penalty amount difference), the IFR 
specifically requested comment on whether there are alternative 
approaches to calculating the beginning of the 30-day cure period for 
this purpose.
Overview of Public Comments
    While a few commenters expressed support for utilizing the current 
scheme in determining which tier should apply to a violation due to 
willful neglect, other commenters expressed concerns with this approach 
due to the uncertainty with determining exactly when the cure period 
begins and that a business associate's knowledge of a violation could 
be imputed to the covered entity prior to the business associate 
notifying the covered entity, as well as concerns if the Secretary does 
not notify an entity of a potential violation in a timely manner. A few 
commenters suggested that the 30-day cure period begin once the 
Department notifies the covered entity of a complaint.
Final Rule
    The final rule retains the policy that the 30-day cure period for 
violations due to willful neglect, like those not due to willful 
neglect, begins on the date that an entity first acquires actual or 
constructive knowledge of the violation and will be determined based on 
evidence gathered by the Department during its investigation, on a 
case-by-case basis.
    First, the requirement that an entity have knowledge that a 
``violation'' has occurred, and not only of the facts underlying the 
violation, is a higher standard than that which is often required by 
other law. Also, as a practical matter, the date an entity has actual 
or constructive knowledge of a violation will vary depending on the 
circumstances involved, and may be the result of notice by a workforce 
member or business associate, a complaint received by a health care 
consumer, or notification by the Department that a complaint has been 
filed. However, other sources of information exist that could establish 
knowledge, including internal indications of a potential noncompliance 
such as unusual access or audit log activity.
    While we understand commenters' concerns relating to the 
uncertainty inherent to constructive knowledge, we believe that it 
provides an appropriate incentive that is consistent with the 
strengthened enforcement of the HIPAA Rules, as provided in the HITECH 
Act. Reliance on notification by a complainant or the Department would 
not encourage self-correction or an entity's establishment of a 
compliance program that proactively prevents, detects and corrects 
indications of noncompliance. If the cure period were solely based on 
external notification, it is quite possible that entities would have 
little or no incentive to make corrections of noncompliance until long 
after an incident occurred, if ever. In response to concerns that 
constructive knowledge may be imputed to the principal when an agent 
fails to notify the responsible entity, we note that an agent must be 
acting within the scope of agency for a covered entity or a business 
associate to be liable for the agent's acts or failures to act. An 
agent that fails to notify a covered entity or business associate may 
be acting outside its scope of authority as an agent. In such a 
circumstance, the agent's knowledge is not imputed to the principal 
under the Federal Common Law of Agency.
    Finally, an entity will have the opportunity to submit evidence 
establishing its knowledge or lack of knowledge, during the 
Department's investigation. Entities will also have a right to request 
a hearing to appeal a finding about knowledge in a notice of proposed 
determination to the extent they believe the finding is not based on a 
preponderance of the evidence. An administrative law judge would then 
review the finding and affirm or modify it.
Response to Other Public Comments
    Comment: A few commenters suggested that 30 days may not be 
sufficient for a covered entity to complete corrective action, 
particularly with respect to large organizations with complex systems, 
structures and relationships. One commenter suggested there should be a 
process available to allow an organization to apply for a reasonable 
extension to complete the cure.
    Response: In response to commenters' concern about the length of 
the 30-day cure period, we note that this time period is defined by 
statute at section 1176(b) of the Social Security Act, and was not 
modified by section 13410(d) of the HITECH Act. Thus, we believe there 
is no authority upon which to base a modification to the length of the 
cure period.
    Comment: One commenter requested that the Department clarify 
whether the new enforcement provisions will apply to violations of all 
HIPAA Administrative Simplification provisions or just to the privacy 
and security requirements.
    Response: The enforcement regulations at 45 CFR Part 160, Subparts 
C, D, and E, relate to compliance with, and the enforcement of, all of 
the Administrative Simplification regulations adopted under subtitle F 
of Title II of HIPAA, including the Standards for Electronic 
Transactions and Code Sets (Transactions and Code Sets Rule(s) 
(referred to in both a singular and plural sense); Standards for 
Privacy of Individually Identifiable Health Information (HIPAA Privacy 
Rule); Standard Unique Employer Identifier (EIN Rule); Security 
Standards (HIPAA Security Rule); and Standard Unique Health Identifier 
for Health Care Providers (NPI Rule). In addition, the Enforcement Rule 
applies to the Breach Notification Rule for HIPAA covered entities and 
business associates.

C. Subparts A and C of Part 164: General Provisions and Modifications 
to the Security Rule

    We proposed implementing modifications to the Security Rule as a 
result of the HITECH Act and to make certain other changes. Below we 
respond to comments received on the proposed changes as well as 
describe the final rule provisions. We also discuss the final technical 
and conforming changes to the general provisions in Subpart A of Part 
164, which applies to the Security, Privacy, and Breach Notification 
Rules, and respond to comments where substantive comments were received 
on these changes.
1. Technical Changes to Subpart A--General Provisions
a. Section 164.102--Statutory Basis
    This section sets out the statutory basis of Part 164. We proposed 
and include in this final rule a technical change to include a 
reference to the provisions of sections 13400 through 13424 of the 
HITECH Act upon which the regulatory changes discussed below are based.
b. Section 164.104--Applicability
    This section sets out to whom Part 164 applies. We proposed to 
replace the existing paragraph (b) with an applicability statement for 
business associates, consistent with the provisions of the HITECH Act. 
Paragraph (b) makes clear that, where provided, the standards, 
requirements, and implementation specifications of the HIPAA Privacy, 
Security, and

[[Page 5588]]

Breach Notification Rules apply to business associates. We also 
proposed to remove as unnecessary the existing language in Sec.  
164.104(b) regarding the obligation of a health care clearinghouse to 
comply with Sec.  164.105 relating to organizational requirements of 
covered entities. This final rule adopts these changes as proposed.
c. Section 164.105--Organizational Requirements
    Section 164.105 outlines the organizational requirements and 
implementation specifications for health care components of covered 
entities and for affiliated covered entities. As Sec.  164.105 now also 
applies to Subpart D of Part 164 regarding breach notification for 
unsecured protected health information, we proposed to remove several 
specific references to Subparts C and E throughout this section to make 
clear that the provisions of this section also apply to Subpart D of 
Part 164. The final rule adopts these modifications.
    In addition, we proposed the following modifications to this 
section.
i. Section 164.105(a)(2)(ii)(C)-(E)
Proposed Rule
    As a covered entity's obligation to ensure that a health care 
component complies with the Privacy and Security Rules is already set 
out at Sec.  164.105(a)(2)(ii), we proposed to modify this section to 
remove as unnecessary paragraphs (C) and (D), which pertain to the 
obligation of a covered entity to ensure that any component that 
performs business associate-like activities and is included in the 
health care component complies with the requirements of the Privacy and 
Security Rules, and to re-designate paragraph (E) as (C). Additionally, 
we requested comment on whether we should require, rather than permit 
as was the case at Sec.  164.105(a)(2)(iii)(C), a covered entity that 
is a hybrid entity to include a component that performs business 
associate-like activities within its health care component so that such 
components are directly subject to the Rules.
Overview of Public Comments
    Several commenters recommended that hybrid entities should retain 
the flexibility to either include or exclude business associates from 
the healthcare component. Two of these commenters stated this option 
would allow the covered entity to distinguish the functions and 
responsibilities of the business associate as separate from the health 
care component, which would result in better compliance, as covered 
entities would evaluate each business associate separately for 
compliance purposes. Further, commenters argued that, as the covered 
entity is ultimately legally liable for compliance on the part of the 
organization, such a modification is not necessary.
    Additionally, several commenters stated that requiring a hybrid 
entity to include business associate departments is excessive and 
burdensome. Some of these commenters further stated that business 
associate departments of a hybrid entity will likely commit limited 
time, personnel, and staff hours to Privacy and Security Rule 
compliance and suggested that the hybrid entity should implement 
applicable entity-wide policies and procedures and separately ensure 
that business associate departments implement specific practices scaled 
to the business associate's use or disclosure of protected health 
information.
    In contrast, several commenters supported the proposed change. 
Several of these commenters suggested that the modification would 
better facilitate compliance, because requiring the covered entity to 
include the business associate department in the health care component 
would better protect the protected health information held by the 
business associate and would ensure consistent standards within the 
health care component of the covered entity.
Final Rule
    Many covered entities perform both covered and non-covered 
functions as part of their business operations. For such covered 
entities, the entire entity is generally required to comply with the 
Privacy Rule. However, the hybrid entity provisions of the HIPAA Rules 
permit the entity to limit the application of the Rules to the entity's 
components that perform functions that would make the component a 
``covered entity'' if the component were a separate legal entity. 
Specifically, this provision allows an entity to designate a health 
care component by documenting the components of its organization that 
perform covered entity functions. The effect of such a designation is 
that most of the requirements of the HIPAA Rules apply only to the 
designated health care component of the entity and not to the functions 
the entity performs that are not included in the health care component. 
While most of the HIPAA Rules' requirements apply only to the health 
care component, the hybrid entity retains certain oversight, 
compliance, and enforcement obligations.
    We explained in the preamble to the 2002 modifications to the 
Privacy Rule that the Rule provides hybrid entities with discretion as 
to whether or not to include business associate divisions within the 
health care component. However, a disclosure of protected health 
information from the health care component to any other division that 
is not part of the health care component, including a business 
associate division, is treated the same as a disclosure outside the 
covered entity. As a result, because an entity generally cannot have a 
business associate agreement with itself, a disclosure from the health 
care component to the business associate division(s) of the entity 
likely would require individual authorization. See 67 FR 53182, 53205 
(Aug. 14, 2002).
    Importantly, after this final rule, business associates, by 
definition, are separately and directly liable for violations of the 
Security Rule and for violations of the Privacy Rule for impermissible 
uses and disclosures pursuant to their business associate contracts. 
With respect to a hybrid entity, however, not including business 
associate functions within the health care component of a hybrid entity 
could avoid direct liability and compliance obligations for the 
business associate component. Thus, we agree with the commenters that 
supported requiring inclusion of business associate functions inside 
the health care component of a hybrid entity. As such, the final rule 
requires that the health care component of a hybrid entity include all 
business associate functions within the entity.
Response to Other Public Comments
    Comment: One commenter requested that the Department revise the 
definitions of ``hybrid entity'' to permit business associates to 
designate a health care component.
    Response: A business associate performs one or more functions on 
behalf of a covered entity (or, in this final rule, another business 
associate). As a business associate is only subject to the HIPAA Rules 
with respect to the protected health information it maintains, uses, or 
discloses on behalf of a covered entity (or business associate) and not 
to other information it may maintain, including health information, 
there is no need for a business associate to designate one or more 
health care components.
    Comment: One commenter asked whether an employer that operates an 
on-site clinic for the treatment of employees functions as a hybrid 
entity.
    Response: An entity that maintains an on-site clinic to provide 
health care to one or more employees may be a HIPAA covered provider to 
the extent the clinic performs one or more covered

[[Page 5589]]

transactions electronically, such as billing a health plan for the 
services provided. If covered, the entity need not become a hybrid 
entity so as to avoid applying the Privacy Rule to health information 
the entity holds in its role as employer, such as sick leave requests 
of its employees. Such information is already excluded from the 
definition of ``protected health information'' as employment records 
and thus, the Privacy Rule does not apply to this information. However, 
the identifiable health information the entity holds as a covered 
health care provider (e.g., the information the clinic holds about 
employees who have received treatment) is protected health information 
and generally may not be shared with the employer for employment 
purposes without the individual's authorization.
ii. Section 164.105(a)(2)(iii)(C)
    We proposed to modify this section to re-designate Sec.  
164.105(a)(2)(iii)(C) as (D), and to include a new paragraph (C), which 
makes clear that, with respect to a hybrid entity, the covered entity 
itself, and not merely the health care component, remains responsible 
for complying with Sec. Sec.  164.314 and 164.504 regarding business 
associate arrangements and other organizational requirements. Hybrid 
entities may need to execute legal contracts and conduct other 
organizational matters at the level of the legal entity rather than at 
the level of the health care component. The final rule adopts this 
change.
iii. Section 164.105(b)(1)
    The final rule fixes a minor typographical error in this paragraph 
by redesignating the second paragraph (1) as paragraph (2).
iv. Section 164.105(b)(2)(ii)
    The final rule simplifies this paragraph by collapsing 
subparagraphs (A), (B), and (C) regarding the obligations of an 
affiliated entity to comply with the Privacy and Security Rules into 
one provision.
d. Section 164.106--Relationship to Other Parts
    The final rule adds a reference in this provision to business 
associates, consistent with their inclusion elsewhere throughout the 
other HIPAA Rules.
2. Modifications to the HIPAA Security Rule in Subpart C
a. Business Associates
Proposed Rule
    Before the HITECH Act, the Security Rule did not directly apply to 
business associates of covered entities. However, section 13401 of the 
HITECH Act provides that the Security Rule's administrative, physical, 
and technical safeguards requirements in Sec. Sec.  164.308, 164.310, 
and 164.312, as well as the Rule's policies and procedures and 
documentation requirements in Sec.  164.316, apply to business 
associates in the same manner as these requirements apply to covered 
entities, and that business associates are civilly and criminally 
liable for violations of these provisions.
    To implement section 13401 of the HITECH Act, we proposed to insert 
references in Subpart C to ``business associate'' following references 
to ``covered entity,'' as appropriate, to make clear that these 
provisions of the Security Rule also apply to business associates. In 
addition, we proposed additional changes to Sec. Sec.  164.306, 
164.308, 164.312, 164.314, and 164.316 of the Security Rule, as 
discussed below.
Overview of Public Comments
    Some commenters argued that the time, implementation expense, 
transaction cost, and liability cost burdens on business associates and 
subcontractors to comply with the Security Rule, especially small and 
mid-size entities, would be significant. Other commenters supported the 
direct application of the Security Rule to business associates and 
subcontractors.
Final Rule
    We adopt the modifications to the Security Rule as proposed to 
implement the HITECH Act's provisions extending direct liability for 
compliance with the Security Rule to business associates. In response 
to the concerns raised regarding the costs of compliance, we note that 
the Security Rule currently requires a covered entity to establish a 
business associate agreement that requires business associates to 
implement administrative, physical, and technical safeguards that 
reasonably and appropriately protect the confidentiality, integrity, 
and availability of the electronic protected health information that 
they create, receive, maintain, or transmit on behalf of the covered 
entity as required by the Security Rule; and to ensure that any agent, 
including a subcontractor, to whom they provide such information agrees 
to implement reasonable and appropriate safeguards to protect it. See 
Sec.  164.314(a). Consequently, business associates and subcontractors 
should already have in place security practices that either comply with 
the Security Rule, or that require only modest improvements to come 
into compliance with the Security Rule requirements.
    Moreover, the requirements of the Security Rule were designed to be 
technology neutral and scalable to all different sizes of covered 
entities and business associates. Covered entities and business 
associates have the flexibility to choose security measures appropriate 
for their size, resources, and the nature of the security risks they 
face, enabling them to reasonably implement any given Security Rule 
standard. In deciding which security measures to use, a covered entity 
or business associate should take into account its size, capabilities, 
the costs of the specific security measures, and the operational 
impact. Thus, the costs of implementing the Security Rule for large, 
mid-sized, or small business associates will be proportional to their 
size and resources.
    Notwithstanding the above, based on the comments, we acknowledge 
that some business associates, particularly the smaller or less 
sophisticated business associates that may have access to electronic 
protected health information for limited purposes, may not have engaged 
in the formal administrative safeguards such as having performed a risk 
analysis, established a risk management program, or designated a 
security official, and may not have written policies and procedures, 
conducted employee training, or documented compliance as the statute 
and these regulations would now require. For these business associates, 
we include an estimate for compliance costs below in the regulatory 
impact analysis. We also refer these business associates to our 
educational papers and other guidance on compliance with the HIPAA 
Security Rule found at: https://www.hhs.gov/ocr/privacy/hipaa/administrative/securityrule. These materials provide guidance on 
conducting risk analyses and implementing the other administrative 
safeguards required by the Security Rule, which may prove helpful to 
these business associates and facilitate their compliance efforts.
b. Section 164.306--Security Standards: General Rules
Proposed Rule
    Section 164.306 sets out the general rules that apply to all of the 
security

[[Page 5590]]

standards and implementation specifications that follow in the Security 
Rule. We proposed technical revisions to Sec.  164.306(e) to more 
clearly indicate that covered entities and business associates must 
review and modify security measures as needed to ensure the continued 
provision of reasonable and appropriate protection of electronic 
protected health information, and update documentation of such security 
measures accordingly.
Final Rule
    The Department did not receive substantive public comment on this 
proposal. The final rule adopts the modifications to Sec.  164.306 as 
proposed.
c. Section 164.308--Administrative Safeguards
Proposed Rule
    We proposed a technical change to Sec.  164.308(a)(3)(ii)(C) 
regarding security termination procedures for workforce members, to add 
the words ``or other arrangement with'' after ``employment of'' in 
recognition of the fact that not all workforce members are employees 
(e.g., some may be volunteers) of a covered entity or business 
associate. We also proposed a number of modifications to Sec.  
164.308(b) to conform to modifications proposed in the definition of 
``business associate.'' Section 164.308(b) provides that a covered 
entity may permit a business associate to create, receive, maintain, or 
transmit electronic protected health information only if the covered 
entity has a contract or other arrangement in place to ensure the 
business associate will appropriately safeguard the protected health 
information. Section164.308(b)(2) contains several exceptions to this 
general rule for certain situations that do not give rise to a business 
associate relationship, such as where a covered entity discloses 
electronic protected health information to a health care provider 
concerning the treatment of an individual. We proposed to remove these 
exceptions from this provision, since as discussed above, they would 
now be established as exceptions to the definition of ``business 
associate.''
    In addition, we proposed to modify Sec.  164.308(b)(1) and (2) to 
clarify that covered entities are not required to obtain satisfactory 
assurances in the form of a contract or other arrangement with a 
business associate that is a subcontractor; rather, it is the business 
associate that must obtain the required satisfactory assurances from 
the subcontractor to protect the security of electronic protected 
health information.
    Finally, we proposed to remove the provision at Sec.  
164.308(b)(3), which provides that a covered entity that violates the 
satisfactory assurances it provided as a business associate of another 
covered entity will be in noncompliance with the Security Rule's 
business associate provisions, as a covered entity's actions as a 
business associate of another covered entity would now be directly 
regulated by the Security Rule's provisions that apply to business 
associates.
Overview of Public Comments
    One commenter asked for confirmation that the changes to Sec.  
164.308 would require a covered entity to enter into a business 
associate agreement with its own business associate and not any 
subcontractors of those business associates.
Final Rule
    The final rule adopts the proposed modifications to Sec.  164.308. 
Section 164.308(b) expressly provides that a covered entity is not 
required to enter into a business associate agreement with a business 
associate that is a subcontractor; rather, this is the obligation of 
the business associate that has engaged the subcontractor to perform a 
function or service that involves the use or disclosure of protected 
health information.
d. Section 164.314--Organizational Requirements
Proposed Rule
    While Section 13401 of the HITECH Act does not expressly include 
Sec.  164.314 among the provisions for which business associates are 
directly liable, it states that Sec.  164.308 of the Security Rule 
applies to business associates ``in the same manner'' that the 
provision applies to covered entities. Section 164.308(b) requires a 
covered entity's business associate agreements to conform to the 
requirements of Sec.  164.314. Accordingly, in order for Sec.  
164.308(b) to apply to business associates in the same manner as it 
applies to covered entities, we proposed to revise Sec.  164.314 to 
reflect that it is also applicable to agreements between business 
associates and subcontractors that create, receive, maintain, or 
transmit electronic protected health information.
    We also proposed a number of modifications to streamline the 
requirements of Sec.  164.314. First, since a business associate for 
purposes of the Security Rule is also always a business associate for 
purposes of the Privacy Rule, we proposed to remove contract provisions 
that were merely duplicative of parallel provisions in the Privacy 
Rule's business associate contract provisions at Sec.  164.504. We also 
proposed to remove the specific requirements under Sec.  
164.314(a)(2)(ii) for other arrangements, such as a memorandum of 
understanding when both a covered entity and business associate are 
governmental entities, and instead simply refer to the parallel Privacy 
Rule requirements at Sec.  164.504(e)(3).
    Second, we proposed conforming modifications to the remaining 
contract requirements in Sec.  164.314(a)(2)(i) to provide that such 
contracts must require a business associate to comply with the Security 
Rule, to ensure any subcontractors enter into a contract or other 
arrangement to protect the security of electronic protected health 
information; and with respect to the reporting of security incidents by 
business associates to covered entities, to report to the covered 
entity breaches of unsecured protected health information as required 
by Sec.  164.410 of the breach notification rules.
    Third, we proposed to add a provision at Sec.  164.314(a)(2)(iii) 
that provides that the requirements of this section for contracts or 
other arrangements between a covered entity and business associate 
would apply in the same manner to contracts or other arrangements 
between business associates and subcontractors required by the proposed 
requirements of Sec.  164.308(b)(4). For example, under these 
provisions, a business associate contract between a business associate 
and a business associate subcontractor would need to provide that the 
subcontractor report any security incident of which it becomes aware, 
including breaches of unsecured protected health information as 
required by Sec.  164.410, to the business associate. This would mean 
that if a breach of unsecured protected health information occurs at or 
by a second tier subcontractor, the subcontractor must notify the 
business associate subcontractor with which it contracts of the breach, 
which then must notify the business associate which contracts with the 
covered entity of the breach, which then must notify the covered entity 
of the breach. The covered entity then notifies the affected 
individuals, the Secretary, and, if applicable, the media, of the 
breach, unless it has delegated such responsibilities to a business 
associate. Finally, we proposed to remove the reference to 
subcontractors in Sec.  164.314(b)(2)(iii) regarding amendment of group 
health plan documents as a condition of disclosure of protected health 
information to a plan sponsor, as unnecessary and to avoid

[[Page 5591]]

confusion with the use of the term subcontractor when referring to 
subcontractors that are business associates.
Final Rule
    The Department did not receive substantive public comment on these 
proposed changes. The final rule adopts the modifications as proposed.
Response to Other Public Comments
    Comment: One commenter suggested that business associate agreements 
should be an ``addressable'' requirement under the Security Rule.
    Response: The HITECH Act does not remove the requirements for 
business associate agreements under the HIPAA Rules. Therefore, we 
decline to make the execution of business associate agreements an 
``addressable'' requirement under the Security Rule.
    Comment: One commenter recommended that the Department remove the 
``addressable'' designation from the Security Rule, because such 
designations lead to ambiguity in the application of the Security Rule 
in the health care industry.
    Response: We decline to adopt this recommendation. The Security 
Rule is structured to be both scalable and flexible, so that entities 
of different types and sizes can implement the standards and 
implementation specifications in a manner that is reasonable and 
appropriate for their circumstances. We do not mandate the use of 
specific technologies, or require uniform policies and procedures for 
compliance, because we recognize the diversity of regulated entities 
and appreciate the unique characteristics of their environments.
    Comment: Two commenters suggested providing subcontractors with 
additional time to comply with the provisions of the Security Rule.
    Response: We decline to delay application of the requirements under 
the Security Rule to subcontractors beyond the compliance dates 
provided by this final rule. As we emphasized above, the Security Rule 
already requires covered entities to establish business associate 
agreements that require business associates to ensure that their 
subcontractors implement reasonable and appropriate safeguards to 
protect the security of electronic protected health information they 
handle.
    Comment: A few commenters proposed alternative ways to apply 
security requirements to subcontractors, such as exempting 
subcontractors from compliance with the Security Rule if they have 
already completed security assessments and met the security 
requirements under other State and Federal laws or only requiring 
subcontractors to comply with the minimum necessary standard and to 
utilize ``reasonable'' security measures with regard to protected 
health information.
    Response: We decline to adopt an exemption or otherwise limit 
subcontractors' responsibility to safeguard individuals' electronic 
protected health information. To ensure appropriate and strong security 
protections for electronic protected health information, subcontractors 
are required to comply with the Security Rule to the same extent as 
business associates with a direct relationship with a covered entity.

D. Subpart E of Part 164: Modifications to the Privacy Rule

    The NPRM proposed a number of changes to the Privacy Rule to 
implement certain provisions of the HITECH Act, as well as certain 
modifications to improve the workability and effectiveness of the Rule 
and to conform the Privacy Rule to PSQIA. The section-by-section 
description below of the final rule discusses the proposed and final 
changes and responds to public comments
1. Section 164.500--Applicability
    Section 13404 of the HITECH Act makes specific requirements of the 
Privacy Rule applicable to business associates and creates direct 
liability for noncompliance by business associates with regard to those 
requirements.
Proposed Rule
    In accordance with section 13404 of the HITECH Act, we proposed 
language in Sec.  164.500 to clarify that, where provided, the 
standards, requirements, and implementation specifications of the 
Privacy Rule apply to business associates.
Overview of Public Comments
    One commenter suggested that the Department expand the 
applicability of the Privacy Rule to all entities that handle 
individually identifiable health information. Some commenters requested 
clarification as to which provisions of the Privacy Rule apply directly 
to business associates, and one commenter recommended applying all of 
the provisions of the Privacy Rule to business associates, including 
requiring business associates to implement reasonable safeguards, train 
employees, and designate a privacy official.
Final Rule
    The final rule implements the proposed revisions to Sec.  164.500. 
While we understand commenters' concerns regarding the uses and 
disclosures of health information by entities not covered by the 
Privacy Rule, the Department is limited to applying the HIPAA Rules to 
those entities covered by HIPAA (i.e., health plans, health care 
clearinghouses, and health care providers that conduct covered 
transactions) and to business associates, as provided under the HITECH 
Act.
    As we discuss further below, section 13404 of the HITECH Act 
creates direct liability for impermissible uses and disclosures of 
protected health information by a business associate of a covered 
entity ``that obtains or creates'' protected health information 
``pursuant to a written contract or other arrangement described in 
Sec.  164.502(e)(2)'' and for compliance with the other privacy 
provisions in the HITECH Act. Section 13404 does not create direct 
liability for business associates with regard to compliance with all 
requirements under the Privacy Rule (i.e., does not treat them as 
covered entities). Therefore, under the final rule, a business 
associate is directly liable under the Privacy Rule for uses and 
disclosures of protected health information that are not in accord with 
its business associate agreement or the Privacy Rule. In addition, a 
business associate is directly liable for failing to disclose protected 
health information when required by the Secretary to do so for the 
Secretary to investigate and determine the business associate's 
compliance with the HIPAA Rules, and for failing to disclose protected 
health information to the covered entity, individual, or individual's 
designee, as necessary to satisfy a covered entity's obligations with 
respect to an individual's request for an electronic copy of protected 
health information. See Sec.  164.502(a)(3) and (a)(4). Further, a 
business associate is directly liable for failing to make reasonable 
efforts to limit protected health information to the minimum necessary 
to accomplish the intended purpose of the use, disclosure, or request. 
See Sec.  164.502(b). Finally, business associates are directly liable 
for failing to enter into business associate agreements with 
subcontractors that create or receive protected health information on 
their behalf. See Sec.  164.502(e)(1)(ii). As was the case under the 
Privacy Rule before the HITECH Act, business associates remain 
contractually liable for all other Privacy Rule obligations that are 
included in

[[Page 5592]]

their contracts or other arrangements with covered entities.
2. Section 164.501--Definitions
a. Definition of ``Health Care Operations''
Proposed Rule
    PSQIA provides, among other things, that Patient Safety 
Organizations (PSOs) are to be treated as business associates of 
covered health care providers. Further, PSQIA provides that the patient 
safety activities of PSOs are deemed to be health care operations of 
covered health care providers under the Privacy Rule. See 42 U.S.C. 
299b-22(i). To conform to these statutory provisions, we proposed to 
amend paragraph (1) of the definition of ``health care operations'' to 
include an express reference to patient safety activities, as defined 
in the PSQIA implementing regulation at 42 CFR 3.20. Many health care 
providers participating in the voluntary patient safety program 
authorized by PSQIA are HIPAA covered entities. PSQIA acknowledges that 
such providers must also comply with the Privacy Rule and deems patient 
safety activities to be health care operations under the Privacy Rule. 
While such types of activities are already encompassed within paragraph 
(1) of the definition, which addresses various quality activities, we 
proposed to expressly include patient safety activities within 
paragraph (1) of the definition of health care operations to conform 
the definition to PSQIA and to eliminate the potential for confusion. 
This modification also addresses public comments the Department 
received during the rulemaking period for the PSQIA implementing 
regulations, which urged the Department to modify the definition of 
``health care operations'' in the Privacy Rule to expressly reference 
patient safety activities so that the intersection of the Privacy and 
PSQIA Rules would be clear. See 73 FR 70732, 70780 (Nov. 21, 2008).
Overview of Public Comments
    The Department received comments supporting the inclusion of 
patient safety activities in the definition of ``health care 
operations.''
Final Rule
    The final rule adopts the proposed modification.
b. Definition of ``Marketing''
Proposed Rule
    The Privacy Rule requires covered entities to obtain a valid 
authorization from individuals before using or disclosing protected 
health information to market a product or service to them. See Sec.  
164.508(a)(3). Section 164.501 defines ``marketing'' as making a 
communication about a product or service that encourages recipients of 
the communication to purchase or use the product or service. Paragraph 
(1) of the definition includes a number of exceptions to marketing for 
certain health-related communications: (1) Communications made to 
describe a health-related product or service (or payment for such 
product or service) that is provided by, or included in a plan of 
benefits of, the covered entity making the communications, including 
communications about: The entities participating in a healthcare 
provider network or health plan network; replacement of, or 
enhancements to, a health plan; and health-related products or services 
available only to a health plan enrollee that add value to, but are not 
part of, a plan of benefits; (2) communications made for the treatment 
of the individual; and (3) communications for case management or care 
coordination for the individual, or to direct or recommend alternative 
treatments, therapies, health care providers, or settings of care to 
the individual. A covered entity is permitted to make these excepted 
communications without an individual's authorization as either 
treatment or health care operations communications, as appropriate, 
under the Privacy Rule. In addition, the Privacy Rule does not require 
a covered entity to obtain individual authorization for face-to-face 
communications or to provide only promotional gifts of nominal value to 
the individual. See Sec.  164.508(a)(3)(i). However, a covered entity 
must obtain prior written authorization from an individual to send 
communications to the individual about non-health related products or 
services or to give or sell the individual's protected health 
information to a third party for marketing. Still, concerns have 
remained about the ability under these provisions for a third party to 
pay a covered entity to send health-related communications to an 
individual about the third party's products or services.
    Section 13406(a) of the HITECH Act limits the health-related 
communications that may be considered health care operations and thus, 
that are excepted from the definition of ``marketing'' under the 
Privacy Rule, to the extent a covered entity receives or has received 
direct or indirect payment in exchange for making the communication. In 
cases where the covered entity would receive such payment, the HITECH 
Act at section 13406(a)(2)(B) and (C) requires that the covered entity 
obtain the individual's valid authorization prior to making the 
communication, or, if applicable, prior to its business associate 
making the communication on its behalf in accordance with its written 
contract. Section 13406(a)(2)(A) of the HITECH Act includes an 
exception to the payment limitation for communications that describe 
only a drug or biologic that is currently being prescribed to the 
individual as long as any payment received by the covered entity in 
exchange for making the communication is reasonable in amount. Section 
13406(a)(3) of the Act provides that the term ``reasonable in amount'' 
shall have the meaning given to such term by the Secretary in 
regulation. Finally, section 13406(a)(4) of the Act clarifies that the 
term ``direct or indirect payment'' does not include any payment for 
treatment of the individual. We believe Congress intended that these 
provisions curtail a covered entity's ability to use the exceptions to 
the definition of ``marketing'' in the Privacy Rule to send 
communications to the individual that are motivated more by commercial 
gain or other commercial purpose rather than for the purpose of the 
individual's health care, despite the communication being about a 
health-related product or service.
    To implement the marketing limitations of the HITECH Act, we 
proposed a number of modifications to the definition of ``marketing'' 
at Sec.  164.501. In paragraph (1) of the definition of ``marketing,'' 
we proposed to maintain the general concept that ``marketing'' means 
``to make a communication about a product or service that encourages 
recipients of the communication to purchase or use the product or 
service.'' In paragraph (2) of the definition, we proposed to include 
three exceptions to this definition to encompass certain treatment and 
health care operations communications about health-related products or 
services. First, we proposed to exclude from the definition of 
``marketing'' certain health care operations communications, except 
where, as provided by the HITECH Act, the covered entity receives 
financial remuneration in exchange for making the communication. This 
would encompass communications to describe a health-related product or 
service (or payment for such product or service) that is provided by, 
or included in a plan of benefits of, the covered entity making the 
communication, as well as communications for case management

[[Page 5593]]

or care coordination, contacting of individuals with information about 
treatment alternatives, and related functions (to the extent these 
activities did not constitute ``treatment'').
    Although the HITECH Act uses the term ``direct or indirect 
payment'' to describe the limitation on permissible health care 
operations disclosures, the proposed rule substituted the term 
``financial remuneration'' to avoid confusion with the term 
``payment,'' which is defined in the Privacy Rule to mean payment for 
health care, and for consistency with the Privacy Rule's current 
authorization requirement for marketing at Sec.  164.508(a)(3), which 
uses the term ``remuneration.'' We proposed to define ``financial 
remuneration'' in paragraph (3) of the definition of ``marketing'' to 
mean direct or indirect payment from or on behalf of a third party 
whose product or service is being described. We also proposed to make 
clear, in accordance with section 13406(a)(4) of the HITECH Act, that 
financial remuneration does not include any direct or indirect payment 
for the treatment of an individual.
    Additionally, because the HITECH Act refers expressly to 
``payment,'' rather than remuneration more generally, the proposed rule 
specified that only the receipt of financial remuneration in exchange 
for making a communication, as opposed to in-kind or any other type of 
remuneration, is relevant for purposes of the definition of marketing. 
We also proposed a conforming change to the required authorization 
provisions for marketing communications at Sec.  164.508(a)(3) to add 
the term ``financial'' before ``remuneration'' and to refer to the new 
definition of ``financial remuneration.''
    The proposed rule emphasized that financial remuneration for 
purposes of the definition of ``marketing'' must be in exchange for 
making the communication itself and be from or on behalf of the entity 
whose product or service is being described. Thus, under these proposed 
provisions, an authorization would be required prior to a covered 
entity making a communication to its patients regarding the acquisition 
of, for example, new state of the art medical equipment if the 
equipment manufacturer paid the covered entity to send the 
communication to its patients; but not if a local charitable 
organization, such as a breast cancer foundation, funded the covered 
entity's mailing to patients about new state of the art mammography 
screening equipment. Furthermore, it would not constitute marketing and 
no authorization would be required if a hospital sent flyers to its 
patients announcing the opening of a new wing where the funds for the 
new wing were donated by a third party, since the financial 
remuneration to the hospital from the third party was not in exchange 
for the mailing of the flyers.
    Second, we proposed to include the statutory exception to marketing 
at section 13406(a)(2)(A) for communications regarding refill reminders 
or otherwise about a drug or biologic that is currently being 
prescribed for the individual, provided any financial remuneration 
received by the covered entity for making the communication is 
reasonably related to the covered entity's cost of making the 
communication. The Act expressly identifies these types of 
communications as being exempt from the remuneration limitation only to 
the extent that any payment received for making the communication is 
reasonable in amount. We requested comment on the scope of this 
exception, that is, whether communications about drugs that are related 
to the drug currently being prescribed, such as communications 
regarding generic alternatives or new formulations of the drug, should 
fall within the exception. We also requested comment on the types and 
amount of costs that should be allowed under this provision. We noted 
that we had considered proposing a requirement that a covered entity 
could only receive financial remuneration for making such a 
communication to the extent it did not exceed the actual cost to make 
the communication. However, because we were concerned that such a 
requirement would impose the additional burden of calculating the costs 
of making each communication, we proposed to allow costs that are 
reasonably related to a covered entity's cost of making the 
communication.
    Third, we proposed to exclude from marketing treatment 
communications about health-related products or services by a health 
care provider to an individual, including communications for case 
management or care coordination for the individual, or to direct or 
recommend alternative treatments, therapies, health care providers, or 
settings of care to the individual, provided, however, that if the 
communications are in writing and financial remuneration is received in 
exchange for making the communications, certain notice and opt out 
conditions are met. While section 13406(a) of the HITECH Act expressly 
provides that a communication to an individual about a health-related 
product or service where the covered entity receives payment from a 
third party in exchange for making the communication shall not be 
considered a health care operation (emphasis added) under the Privacy 
Rule, and thus is marketing, it is unclear how Congress intended these 
provisions to apply to treatment communications between a health care 
provider and a patient. Specifically, it is unclear whether Congress 
intended to restrict only those subsidized communications about 
products and services that are less essential to an individual's health 
care (i.e., those classified as health care operations communications) 
or all subsidized communications about products and services, including 
treatment communications. Given this ambiguity and to avoid undue 
interference with treatment communications between the individual and a 
health care provider, we proposed to continue to allow subsidized 
treatment communications, but conditioned on providing the individual 
with notice and an opportunity to opt out of receiving such 
communications. Specifically, to ensure the individual is aware that he 
or she may receive subsidized treatment communications from his or her 
provider and has the opportunity to elect not to receive them, the 
proposed rule would have required at Sec.  164.514(f)(2) that: (1) The 
covered health care provider's notice of privacy practices include a 
statement informing individuals that the provider may send treatment 
communications to the individual concerning treatment alternatives or 
other health-related products or services where the provider receives 
financial remuneration from a third party in exchange for making the 
communication, and the individual has a right to opt out of receiving 
such communications; and (2) the treatment communication itself 
disclose the fact of remuneration and provide the individual with a 
clear and conspicuous opportunity to elect not to receive any further 
such communications. We requested comment on how the opt out should 
apply to future subsidized treatment communications (i.e., should the 
opt out prevent all future subsidized treatment communications by the 
provider or just those dealing with the particular product or service 
described in the current communication?). We also requested comment on 
the workability of requiring health care providers that intend to send 
subsidized treatment communications to individuals to provide an 
individual with the opportunity to opt out of receiving such 
communications prior to the individual receiving the first 
communication and what mechanisms

[[Page 5594]]

could be put into place to implement such a requirement.
    Given that the new marketing limitations on the receipt of 
remuneration by a covered entity would apply differently depending on 
whether a communication is for treatment or health care operations 
purposes, and that distinguishing such communications may in many cases 
call for close judgments, we requested comment on the alternatives of 
excluding treatment communications altogether even if they involve 
financial remuneration from a third party or requiring individual 
authorization for both treatment and health care operations 
communications made in exchange for financial remuneration.
    Finally, we proposed to remove the language defining as marketing 
an arrangement between a covered entity and any other entity in which 
the covered entity discloses protected health information to the other 
entity, in exchange for remuneration, for the other entity or its 
affiliate to make a communication about its own product or service that 
encourages recipients of the communication to purchase or use that 
product or service, since such activity would now constitute a 
prohibited ``sale'' of protected health information under section 
13405(d) of the HITECH Act and the proposed rule.
Overview of Public Comments
    Several commenters asked as a general matter that the final rule 
retain the current definition of ``marketing'' and that no changes to 
this provision be implemented. With respect to subsidized treatment 
communications, many commenters expressed support for the decision in 
the NPRM to not require authorizations for such communications, and 
several argued for removing even the opt out requirement. Other 
commenters believed that all communications in which the covered entity 
receives financial remuneration for making the communication, 
regardless of whether the communication is for treatment purposes, 
should be considered marketing and require authorization.
    While many commenters were generally in support of not requiring 
authorization for treatment communications, at the same time, several 
commenters expressed concern with the difficulty of distinguishing 
between treatment communications and communications for health care 
operations purposes. These commenters stated that additional 
clarification regarding this distinction would be needed to be able to 
implement the NPRM's marketing provisions. Several commenters stated 
that while the distinction may be clear in some limited circumstances, 
there are other circumstances where it may be difficult for covered 
entities to determine what type of communication they are sending and 
whether authorization or just disclosure in the notice of privacy 
practices and the opportunity to opt out would be required. For 
example, while the NPRM stated that whether a communication is being 
made for treatment purposes or for health care operations purposes 
would depend on the extent to which the covered entity is making the 
communication in a population-based fashion (health care operations) or 
to further the treatment of a particular individual's health care 
status or condition (treatment), many commenters stated that there may 
be circumstances in which a covered entity provides a population-based 
communication to further the treatment of the health care status or 
condition of an entire group of individuals. Other commenters suggested 
that the distinction between communications for treatment and those for 
health care operations purposes should be made based on the entity 
providing the communication: If a health care provider is providing the 
communication, it should be deemed for treatment purposes; however, if 
the communication is made by a covered entity other than a health care 
provider, the determination should be based on whether the 
communication is individual (treatment) or population based (health 
care operations).
    With respect to the subsidized treatment communications, commenters 
opposed to the opt out notification generally took one of three 
positions: All such communications should require authorizations to 
best protect patient privacy; an opt in method would better permit 
individuals to make more informed choices about whether to receive such 
communications; or a covered entity should be permitted to make these 
communications without an opportunity to opt out, because of unintended 
effects that may adversely affect the quality of care provided. Some 
commenters asked, if the opt out requirement is retained, that OCR 
ensure that covered entities are given significant flexibility in 
determining how best to implement the opt out requirement.
    Additionally, the vast majority of commenters did not believe there 
should be an opportunity to opt out of receiving subsidized treatment 
communications prior to receipt of the first such communication. The 
commenters believed that requiring an opportunity to opt out prior to 
the first communication would be too costly and burdensome for most 
covered entities. Many also noted that the statement in the notice of 
privacy practices, which would inform individuals of their option to 
opt out of receiving subsidized treatment communications, could serve 
as an opportunity to opt out before the first communication. Some 
commenters expressed concern even with including a statement in the 
notice of privacy practices because of the cost associated with 
modifying notices to do so.
    With respect to the scope of the proposed opt out, most commenters 
believed that the opt out should apply only to subsidized treatment 
communications related to a specific product or service and should not 
apply universally to all similar future communications from the covered 
entity. These commenters stated that it would be difficult for an 
individual to elect, in a meaningful way, not to receive all future 
subsidized treatment communications because he or she would not know 
exactly what he or she is opting out of without receiving at least one 
communication. Other commenters believed that while a product or 
service-specific application of the opt out would be ideal, it is 
simply unrealistic and infeasible for covered entities to be able to 
implement such a policy. These commenters stated that a universal opt 
out, which would apply to all future subsidized treatment 
communications, would be much simpler and easier for covered entities 
to implement. Additionally, while some commenters believed that 
individuals should be able to decide whether they want to opt out of 
specific subsidized treatment communications or all future such 
communications, most commenters supported giving covered entities the 
flexibility to determine the scope of this opt out provision based on 
their own specific capabilities. Many of these commenters also 
suggested that the final rule permit individuals who have opted out of 
receiving such communications to opt back in to receive future notices 
using the same methods through which the individuals had opted out.
    The Department also received several comments on the definition of 
``financial remuneration.'' Several commenters supported the NPRM's 
definition of ``financial remuneration''; however, many commenters 
asked for clarification regarding the scope of the definition and the 
meaning of the phrase ``direct or indirect payment.'' For example, some 
commenters asked for confirmation that non-financial benefits did not 
constitute financial

[[Page 5595]]

remuneration, while other commenters wanted the exception for refill 
reminders (that is, the communication is not marketing as long as the 
financial remuneration does not exceed the related costs of the 
communication) to apply more broadly to all marketing communications. 
Additionally, some commenters suggested that the final rule clarify 
that only financial remuneration in exchange for sending a 
communication triggers either the authorization or the statement of 
notice and opt out requirement and not the exchange of financial 
remuneration for the development or funding for programs, which may 
include the sending of a communication. These commenters generally 
suggested that the final rule give covered entities the flexibility to 
determine whether the financial remuneration received is truly in 
exchange for making the communication.
    We received a great deal of public comment on the exception to the 
definition of ``marketing'' for providing refill reminders or to 
otherwise communicate about a drug or biologic currently being 
prescribed for the individual where the only financial remuneration 
received by the covered entity in exchange for making the communication 
is reasonably related to the covered entity's cost of making the 
communication. In general, most commenters supported this exception; 
however, a few commenters disagreed with the exception and felt that 
refill reminders should be treated as treatment communications 
requiring a statement in the notice and an opportunity to opt out if 
the communication is subsidized. Many commenters expressed the need for 
guidance on the scope of this exception and stated that certain 
communications should fall into the exception, such as communications 
about generic alternatives and drug adherence, and communications 
related to every component of a drug or biologic delivery system 
(especially where patients must self-administer medication). Some 
commenters specifically asked that the final rule exclude certain types 
of communications from this exception.
    With respect to the proposed cost limitation on the refill reminder 
exception, while some commenters suggested that the cost be limited to 
either the actual cost or the fair market value of providing the 
communication, generally, most commenters supported the position that 
reasonably related costs should not be limited to actual costs. Many of 
the commenters in support of a broad interpretation of costs 
``reasonably related'' to providing the communication suggested 
specific costs that should be permitted under this exception, such as 
costs of personnel, data storage, data processing, data analysis, data 
security, software, hardware, employee training, message content 
development, clinical review, postage, materials, drug adherence 
program development, formulary development, and the creation and 
implementation of analytics to measure the effectiveness of the 
communication. Several commenters noted that it would be unrealistic to 
expect a covered entity to perform such non-essential functions as 
sending refill reminders and other related communications if they could 
not recoup both their direct and indirect costs as well as a modest 
profit.
Final Rule
    The final rule significantly modifies the proposed rule's approach 
to marketing by requiring authorization for all treatment and health 
care operations communications where the covered entity receives 
financial remuneration for making the communications from a third party 
whose product or service is being marketed. Many of the comments we 
received in response to the proposed marketing provisions concerned the 
distinction between communications for treatment and those for health 
care operations purposes and sought clarification on the line between 
such communications. We acknowledge that the distinction between what 
constitutes a treatment versus a health care operations communication 
may be difficult to make with precision in all cases, placing covered 
entities at risk for violating the authorization requirement for 
marketing communications. We, therefore, believe that requiring 
authorizations for all subsidized communications that market a health 
related product or service is the best policy. Such a policy will 
ensure that all such communications are treated as marketing 
communications, instead of requiring covered entities to have two 
processes in place based on whether the communication provided to 
individuals is for a treatment or a health care operations purpose. We 
decline to retain the Privacy Rule's definition of what constitutes 
``marketing'' unchanged, as suggested by some commenters, as doing so 
would be inconsistent with the provisions of the Section 13406(a) of 
the HITECH Act.
    Because the final rule treats subsidized treatment communications 
as marketing communications that require authorization, we have not 
adopted the notice requirement at proposed Sec.  164.520(b)(1)(iii)(A) 
that a covered entity's notice of privacy practices include a statement 
informing individuals that the provider may send treatment 
communications to the individual concerning treatment alternatives or 
other health-related products or services where the provider receives 
financial remuneration from a third party in exchange for making the 
communication, and the individual has a right to opt out of receiving 
such communications. We also do not retain the notice requirement that 
existed at Sec.  164.520(b)(1)(iii) prior to this final rule that a 
covered entity include in its notice of privacy practices a statement 
that the covered entity may contact the individual to provide 
appointment reminders or information about treatment alternatives or 
other health-related benefits and services that may be of interest to 
the individual. Where the sending of such communications involves 
financial remuneration, the individual will be notified of such 
communications through the authorization process. Other communications 
for such purposes that do not involve financial remuneration are 
adequately captured in a covered entity's description in its notice of 
privacy practices of treatment and health care operations. However, 
covered entities that wish to continue to include such a specific 
statement in their notices of privacy practices may do so. For further 
discussion about the Notice of Privacy Practices, please see the 
discussion addressing the provisions at Sec.  164.520 below.
    We adopt the term ``financial remuneration'' and its definition as 
proposed without modification in the final rule. Most commenters were 
generally satisfied with the proposed use of the term and its 
definition. There was, however, some confusion among commenters as to 
what constitutes direct or indirect payment from or on behalf of a 
third party. We clarify that under this provision direct payment means 
financial remuneration that flows from the third party whose product or 
service is being described directly to the covered entity. In contrast, 
indirect payment means financial remuneration that flows from an entity 
on behalf of the third party whose product or service is being 
described to a covered entity.
    We also clarify that where a business associate (including a 
subcontractor), as opposed to the covered entity itself, receives 
financial remuneration from a third party in exchange for making a 
communication about a product or service, such communication also 
requires prior authorization from the individual. The HITECH Act at 
Section 13406(a)(2)(C) provides that a business

[[Page 5596]]

associate may make such communications on behalf of a covered entity if 
consistent with the written contract required by the Privacy Rule 
between the business associate and covered entity. The Privacy Rule a 
Sec.  164.504(e)(2)(i) provides that the contract may not authorize the 
business associate to further use or disclose the protected health 
information in a manner that would violate the Rule if done by the 
covered entity (except in two limited circumstances not relevant here). 
Thus, individual authorization also must be obtained if a business 
associate is to send these communications instead of the covered 
entity.
    We also confirm, in response to comments, that the term ``financial 
remuneration'' does not include non-financial benefits, such as in-kind 
benefits, provided to a covered entity in exchange for making a 
communication about a product or service. Rather, financial 
remuneration includes only payments made in exchange for making such 
communications. In addition, we continue to emphasize that the 
financial remuneration a covered entity receives from a third party 
must be for the purpose of making a communication and such 
communication must encourage individuals to purchase or use the third 
party's product or service. If the financial remuneration received by 
the covered entity is for any purpose other than for making the 
communication, then this marketing provision does not apply. For 
example, if a third party provides financial remuneration to a covered 
entity to implement a program, such as a disease management program, 
the covered entity could provide individuals with communications about 
the program without obtaining individual authorization as long as the 
communications are about the covered entity's program itself. There, 
the communications would only be encouraging individuals to participate 
in the covered entity's disease management program and would not be 
encouraging individuals to use or purchase the third party's product or 
service.
    Under the final rule, for marketing communications that involve 
financial remuneration, the covered entity must obtain a valid 
authorization from the individual before using or disclosing protected 
health information for such purposes, and such authorization must 
disclose the fact that the covered entity is receiving financial 
remuneration from a third party. See Sec.  164.508(a)(3). The scope of 
the authorization need not be limited only to subsidized communications 
related to a single product or service or the products or services of 
one third party, but rather may apply more broadly to subsidized 
communications generally so long as the authorization adequately 
describes the intended purposes of the requested uses and disclosures 
(i.e., the scope of the authorization) and otherwise contains the 
elements and statements of a valid authorization under Sec.  164.508. 
This includes making clear in the authorization that the individual may 
revoke the authorization at any time he or she wishes to stop receiving 
the marketing material.
    Because the final rule will treat all subsidized treatment 
communications as marketing communications for which an authorization 
is required, the final rule also removes the language at proposed Sec.  
164.514(f)(2), which proposed to require that such communications be 
accompanied by a statement in the notice and an opportunity for the 
individual to opt out of receiving such communications. We believe that 
the removal of the notice and opt out requirements for such 
communications and the addition of the requirement to obtain an 
authorization will provide covered entities with a more uniform system 
for treating all remunerated communications. Because the individual 
must now sign an authorization before the covered entity can make 
subsidized treatment communications, there is no longer any need to 
require each such communication to contain a clear and conspicuous 
opportunity for the individual to elect not to receive any more of 
these communications. Where the individual signs an authorization to 
receive such communications, the covered entity may use and disclose 
the individual's protected health information for the purposes of 
making such communications unless or until the individual revokes the 
authorization pursuant to Sec.  164.508(a)(5). If the individual does 
not authorize the covered entity to use and disclose the individual's 
protected health information for the purposes of making subsidized 
treatment communications, then the covered entity is prohibited from 
doing so.
    We clarify that the final rule does nothing to modify the 
exceptions to the authorization requirement for marketing 
communications at Sec.  164.508(a)(3)(i)(A) and (B). Therefore, no 
authorization is required where a covered entity receives financial 
remuneration from a third party to make a treatment or health care 
operations communication (or other marketing communication), if the 
communication is made face-to-face by a covered entity to an individual 
or consists of a promotional gift of nominal value provided by the 
covered entity. For example, a health care provider could, in a face to 
face conversation with the individual, recommend, verbally or by 
handing the individual written materials such as a pamphlet, that the 
individual take a specific alternative medication, even if the provider 
is otherwise paid by a third party to make such communications. 
However, communications made over the phone (as well as all 
communications sent through the mail or via email) do not constitute 
face to face communications, and as such, these communications require 
individual authorization where the covered entity receives remuneration 
in exchange for making the communications.
    With respect to the exception for refill reminders or to otherwise 
communicate about a drug or biologic currently being prescribed to the 
individual, we adopt the exception as proposed. We continue to provide 
a stand-alone exception for refill reminders, given that the HITECH Act 
expressly does so. We therefore decline to adopt the suggestions of 
commenters to consider these communications to specifically be 
treatment communications (which would have required, under the 
provisions of the proposed rule, notice and an opportunity to opt out 
where the covered entity receives financial remuneration), or health 
care operations communications (which require authorization if 
financial remuneration is received).
    Many commenters asked for guidance and clarification regarding the 
scope of this exception, and we received a wide array of examples of 
communications that commenters suggested should fall within this 
exception. At this time, we clarify that we consider communications 
about the generic equivalent of a drug being prescribed to an 
individual as well as adherence communications encouraging individuals 
to take their prescribed medication as directed fall within the scope 
of this exception. Additionally, we clarify that where an individual is 
prescribed a self-administered drug or biologic, communications 
regarding all aspects of a drug delivery system, including, for 
example, an insulin pump, fall under this exception. With respect to 
the array of other examples and suggestions provided by commenters as 
to what should fall within or outside of the exception, we intend to 
provide future guidance to address these questions.
    The proposed rule contained the Act's limitation that the financial

[[Page 5597]]

remuneration received in exchange for providing a refill reminder or to 
otherwise communicate about a drug or biologic currently being 
prescribed to the individual must be ``reasonable in amount,'' by 
providing that such remuneration must be reasonably related to the 
covered entity's cost of making the communication for the exception 
from marketing to apply. We adopt this provision in the final rule. In 
response to comments regarding what types of costs fall within 
permissible remuneration, we clarify that we consider permissible costs 
for which a covered entity may receive remuneration under this 
exception are those which cover only the costs of labor, supplies, and 
postage to make the communication. Where the financial remuneration a 
covered entity receives in exchange for making the communication 
generates a profit or includes payment for other costs, such financial 
remuneration would run afoul of the Act's ``reasonable in amount'' 
language. Thus, under this final rule, if a pharmacy receives financial 
remuneration from a drug manufacturer to provide refill reminders to 
individuals taking a particular drug that covers only the pharmacy's 
cost of drafting, printing, and mailing the refill reminders, the 
exception would apply and no authorization would be required. However, 
where the drug manufacturer also provides the pharmacy with a financial 
incentive beyond the cost of making the communication to encourage the 
pharmacy's continued willingness to send such communications on behalf 
of the drug manufacturer, the exception would not apply and the 
pharmacy must obtain individual authorization. We note, however, that 
if a pharmacy provides refill reminders to individuals only when they 
visit the pharmacy (in face to face encounters), such communications 
would be permitted under Sec.  164.508(a)(3)(i)(A) and thus, 
authorization would not be required even if the pharmacy receives 
financial remuneration above and beyond what is reasonably related to 
the pharmacy's cost of making the communication.
    Finally, in addition to the communications that fall within the 
refill reminder exception, two other types of communications continue 
to be exempt from the marketing provisions. First, as explained in the 
NPRM, communications promoting health in general and that do not 
promote a product or service from a particular provider, such as 
communications promoting a healthy diet or encouraging individuals to 
get certain routine diagnostic tests, such as annual mammograms, do not 
constitute marketing and thus, do not require individual authorization.
    Second, communications about government and government-sponsored 
programs do not fall within the definition of ``marketing'' as there is 
no commercial component to communications about benefits through public 
programs. Therefore, a covered entity may use and disclose protected 
health information to communicate with individuals about eligibility 
for programs, such as Medicare, Medicaid, or the State Children's 
Health Insurance Program (CHIP) without obtaining individual 
authorization.
Response to Other Public Comments
    Comment: One commenter asked whether it is marketing where an 
entity promotes its discounts on covered benefits or member-exclusive 
value-added health products and services by paying a mailing house that 
is the health plan's business associate to send its written promotional 
material to health plan members. The commenter stated that only the 
mailing house, and not the covered entity, is paid to send the 
communications.
    Response: Even where a business associate of a covered entity, such 
as a mailing house, rather than the covered entity itself, receives the 
financial remuneration from the entity whose product or service is 
being promoted to health plan members, the communication is a marketing 
communication for which prior authorization is required. As stated 
above, under the Privacy Rule, a business associate generally may not 
use or disclose protected health information in a manner that would be 
impermissible if done by the covered entity. We note, however, that 
non-financial or in-kind remuneration may be received by the covered 
entity or its business associate and it would not implicate the new 
marketing restrictions. Thus, if the materials describing a member-
exclusive value-added health product or service were provided by the 
entity to the health plan or its business associate and no payment was 
made by the entity relating to the mailing or distribution of the 
materials, the covered entity or its business associate would be able 
to provide the material to its members without requiring an 
authorization.
3. Business Associates
a. Section 164.502(a) and (b)--Permitted and Required Uses and 
Disclosures and Minimum Necessary
    Before the HITECH Act, the Privacy Rule did not govern business 
associates directly. However, section 13404 of the HITECH Act makes 
specific requirements of the Privacy Rule applicable to business 
associates, and creates direct liability for noncompliance by business 
associates with regard to those Privacy Rule requirements. 
Specifically, section 13404(a) of the HITECH Act creates direct 
liability for uses and disclosures of protected health information by 
business associates that do not comply with its business associate 
contract or other arrangement under the Privacy Rule. Additionally, 
section 13404(a) applies the other privacy requirements of the HITECH 
Act directly to business associates just as they apply to covered 
entities. Section 13404(b) applies the provision of Sec.  
164.504(e)(1)(ii) regarding knowledge of a pattern of activity or 
practice that constitutes a material breach or violation of a contract 
to business associates. Finally, section 13404(c) applies the HIPAA 
civil and criminal penalties to business associates. We discuss the 
modifications to the Privacy Rule pursuant to paragraphs (a) and (b) of 
section 13404 of the HITECH Act below. We address the modifications 
made to the Enforcement Rule by section 13404(c) regarding the 
application of penalties to violations by business associates above in 
the discussion of the changes to the Enforcement Rule.
    We note that we have not added references to ``business associate'' 
to all provisions of the Privacy Rule that address uses and disclosures 
by covered entities. Such additions to the Privacy Rule are 
unnecessary, as a business associate generally may only use or disclose 
protected health information in the same manner as a covered entity. 
Therefore, any Privacy Rule limitation on how a covered entity may use 
or disclose protected health information automatically extends to a 
business associate.
i. Permitted and Required Uses and Disclosures
Proposed Rule
    We proposed to modify Sec.  164.502(a) of the Privacy Rule 
containing the general rules for uses and disclosures of protected 
health information to address the permitted and required uses and 
disclosures of protected health information by business associates. 
First, we proposed to modify

[[Page 5598]]

Sec.  164.502(a) to provide that a business associate, like a covered 
entity, may not use or disclose protected health information except as 
permitted or required by the Privacy Rule or the Enforcement Rule. 
Second, we proposed to add new provisions at Sec.  164.502(a)(4) and 
(5) to specify the permitted and required uses and disclosures of 
protected health information by business associates.
    In accordance with section 13404(a) of the HITECH Act, we proposed 
in Sec.  164.502(a)(4) to allow business associates to use or disclose 
protected health information only as permitted or required by their 
business associate contracts or other arrangements pursuant to Sec.  
164.504(e) or as required by law. Any other use or disclosure would 
violate the Privacy Rule. Proposed Sec.  164.502(a)(4) also provided 
that a business associate would not be permitted to use or disclose 
protected health information in a manner that would violate the Privacy 
Rule if done by the covered entity, except that the business associate 
would be permitted to use or disclose protected health information for 
the proper management and administration of the business associate and 
to provide data aggregation services for the covered entity, as 
specified at Sec.  164.504(e)(2)(i)(A) and (B), if such uses and 
disclosures are permitted by its business associate contract or other 
arrangement.
    In Sec.  164.502(a)(5), we proposed to require that a business 
associate disclose protected health information either: (1) When 
required by the Secretary under Subpart C of Part 160 to investigate or 
determine the business associate's compliance with this subchapter; or 
(2) to the covered entity, individual, or individual's designee, as 
necessary to satisfy a covered entity's obligations under Sec.  
164.524(c)(2)(ii) and (3)(ii), as modified, with respect to an 
individual's request for an electronic copy of protected health 
information. Section 13405(e) of the HITECH Act requires covered 
entities that maintain protected health information in an electronic 
health record to provide an individual, or the individual's designee, 
with a copy of such information in an electronic format, if the 
individual so chooses. We proposed to include a similar direct 
requirement on business associates in Sec.  164.502(a)(5), as section 
13404(a) of the HITECH Act also applies section 13405(e) to business 
associates.
    We also proposed a conforming change to revise the titles of Sec.  
164.502(a)(1) and (a)(2) to make clear that these provisions setting 
out permitted uses and disclosures of protected health information 
apply only to covered entities, as well as a technical change to Sec.  
164.502(a)(2)(ii) to replace the term ``subpart'' with ``subchapter'' 
to make clear that a covered entity is required to disclose protected 
health information to the Secretary as needed to determine compliance 
with any of the HIPAA Rules and not just the Privacy Rule.
Overview of Public Comments
    Several commenters expressed concern about the increased liability 
for business associates under the rule and requested clarification on 
when business associate liability for impermissible uses and 
disclosures would attach. Several commenters asked for clarification as 
to what a business associate is directly liable for under the Privacy 
Rule, and some expressed specific confusion regarding the liability of 
business associates for the provision of e-access under the rule.
Final Rule
    The final rule adopts the proposed modifications to Sec.  
164.502(a). The provisions specifying a business associate's permitted 
and required uses and disclosures of protected health information are 
renumbered from Sec.  164.502(a)(4) and (a)(5), as proposed, to Sec.  
164.502(a)(3) and (a)(4), as Sec.  164.502(a)(5) of the final rule now 
includes provisions to address prohibited uses and disclosures. Section 
164.502(a)(5) is discussed below in the sections describing the 
prohibitions on the sale of protected health information and the use or 
disclosure of genetic information for underwriting purposes.
    In response to specific comments asking for clarification regarding 
when business associate liability would attach, we provide the 
following. As we discussed above, the final rule provides that a 
business associate is a person who performs functions or activities on 
behalf of, or certain services for, a covered entity or another 
business associate that involve the use or disclosure of protected 
health information. The final rule establishes that a person becomes a 
business associate by definition, not by the act of contracting with a 
covered entity or otherwise. Therefore, liability for impermissible 
uses and disclosures attaches immediately when a person creates, 
receives, maintains, or transmits protected health information on 
behalf of a covered entity or business associate and otherwise meets 
the definition of a business associate.
    Liability also does not depend on the type of protected health 
information that a business associate creates, receives, maintains, or 
transmits on behalf of a covered entity or another business associate, 
or on the type of entity performing the function or service, except to 
the extent the entity falls within one of the exceptions at paragraph 4 
of the definition of business associate. First, protected health 
information created, received, maintained, or transmitted by a business 
associate may not necessarily include diagnosis-specific information, 
such as information about the treatment of an individual, and may be 
limited to demographic or other information not indicative of the type 
of health care services provided to an individual. If the information 
is tied to a covered entity, then it is protected health information by 
definition since it is indicative that the individual received health 
care services or benefits from the covered entity, and therefore it 
must be protected by the business associate in accordance with the 
HIPAA Rules and its business associate agreement. Second, the 
definition of business associate is contingent on the fact that the 
business associate performs certain activities or functions on behalf 
of, or provides certain services to, a covered entity or another 
business associate that involve the use or disclosure of protected 
health information. Therefore, any person, defined in the HIPAA Rules 
as a natural person, trust or estate, partnership, corporation, 
professional association or corporation, or other entity, public or 
private, who performs these functions or activities or services is a 
business associate for purposes of the HIPAA Rules, regardless of 
whether such person has other professional or privilege-based duties or 
responsibilities.
    Finally, while we understand commenters' concerns about the 
increased liability for business associates under the HIPAA Rules, such 
direct liability for violations of certain HIPAA provisions is 
expressly provided for by the HITECH Act.
    In response to comments requesting clarification on with which 
HIPAA provisions a business associate is directly liable for 
compliance, we provide the following. Business associates are directly 
liable under the HIPAA Rules for impermissible uses and disclosures,\4\ 
for a failure to provide breach notification to the covered entity,\5\ 
for a failure to provide access to a copy of electronic protected 
health information to either the covered entity, the individual, or the 
individual's designee (whichever is specified in the

[[Page 5599]]

business associate agreement),\6\ for a failure to disclose protected 
health information where required by the Secretary to investigate or 
determine the business associate's compliance with the HIPAA Rules,\7\ 
for a failure to provide an accounting of disclosures,\8\ and for a 
failure to comply with the requirements of the Security Rule.\9\ 
Business associates remain contractually liable for other requirements 
of the business associate agreement (see below for a discussion of the 
business associate agreement provisions).
---------------------------------------------------------------------------

    \4\ See Sec.  164.502(a)(3).
    \5\ See Sec.  164.410.
    \6\ See Sec.  164.502(a)(4)(ii).
    \7\ See Sec.  164.502(a)(4)(i).
    \8\ See 76 FR 31426 (May 31, 2011).
    \9\ See Subpart C of Part 164.
---------------------------------------------------------------------------

    With respect to a business associate's direct liability for a 
failure to provide access to a copy of electronic protected health 
information, business associates are liable for providing electronic 
access in accordance with their business associate agreements. 
Therefore, business associates may provide electronic access directly 
to individuals or their designees, or may provide the electronic 
protected health information to the covered entity (which then provides 
the electronic access to individuals or their designees). As with many 
other provisions in the HIPAA Rules, the Department leaves the details 
to the contracting parties, and is concerned only that access is 
provided to the individual, not with which party provides the access.
ii. Minimum Necessary
Proposed Rule
    We proposed to modify the minimum necessary standard at Sec.  
164.502(b) to require that when business associates use, disclose, or 
request protected health information from another covered entity, they 
limit protected health information to the minimum necessary to 
accomplish the intended purpose of the use, disclosure, or request. 
Applying the minimum necessary standard is a condition of the 
permissibility of many uses and disclosures of protected health 
information. Thus, a business associate is not making a permitted use 
or disclosure under the Privacy Rule if it does not apply the minimum 
necessary standard, where appropriate. Additionally, the HITECH Act at 
section 13405(b) addresses the application of minimum necessary and, in 
accordance with 13404(a), also applies such requirements to business 
associates.
Overview of Public Comments
    While the Department received general support for application of 
the minimum necessary standard to requests and uses and disclosures by 
business associates, several commenters requested clarification on such 
application.
Final Rule
    The final rule adopts the proposal to apply the minimum necessary 
standard directly to business associates when using or disclosing 
protected health information or when requesting protected health 
information from another covered entity. The final rule also makes 
clear that requests directed to another business associate, in addition 
to those directed to another covered entity, must also be limited to 
the minimum necessary. Covered entities and business associates 
disclosing protected health information in response may reasonably rely 
on such requests as requesting the minimum necessary for the 
disclosure.
    How a business associate will apply the minimum necessary standard 
will vary based on the circumstances. As is the case today, a business 
associate agreement must limit the business associate's uses and 
disclosures of protected health information to be consistent with the 
covered entity's minimum necessary policies and procedures. We leave it 
to the discretion of the parties to determine to what extent the 
business associate agreement will include specific minimum necessary 
provisions to ensure a business associate's uses and disclosures and 
requests for protected health information are consistent with the 
covered entity's minimum necessary policies and procedures. The 
Department intends to issue future guidance on the minimum necessary 
standard in accordance with section 13405(b) of the HITECH Act that 
will consider the specific questions posed by commenters with respect 
to business associates' application of the minimum necessary standard.
b. Sections 164.502(e) and 164.504(e)--Business Associate Agreements
Proposed Rule
    Section 164.502(e) permits a covered entity to disclose protected 
health information to a business associate and may allow a business 
associate to create or receive protected health information on its 
behalf, if the covered entity obtains satisfactory assurances, in the 
form of a written contract or other written arrangement with the 
business associate that meets the requirements of Sec.  164.504(e), 
that the business associate will appropriately safeguard the 
information. We proposed a parallel provision in Sec.  164.502(e) that 
would allow a business associate to disclose protected health 
information to a business associate that is a subcontractor, and to 
allow the subcontractor to create or receive protected health 
information on its behalf, if the business associate obtains similar 
satisfactory assurances that the subcontractor will appropriately 
safeguard the information. Consistent with the proposal with respect to 
Security Rule requirements and business associates, we proposed to make 
clear in Sec.  164.502(e) that a covered entity would not be required 
to obtain satisfactory assurances from business associates that are 
subcontractors. Rather, a business associate would be required to 
obtain such assurances from a subcontractor. Thus, the proposed 
provisions would not change the parties to the contracts. For example, 
a covered entity may choose to contract with a business associate 
(contractor) to use or disclose protected health information on its 
behalf, the business associate may choose to obtain the services of 
(and exchange protected health information with) a subcontractor 
(subcontractor 1), and that subcontractor may, in turn, contract with 
another subcontractor (subcontractor 2) for services involving 
protected health information. The contractor and subcontractors 1 and 2 
would now be business associates with direct liability under the HIPAA 
Rules, and would be required to obtain business associate agreements 
with the parties with whom they contract for services that involve 
access to protected health information. (Note, however, as discussed 
above with respect to the definition of ``business associate,'' direct 
liability under the HIPAA Rules would attach regardless of whether the 
contractor and subcontractors have entered into the required business 
associate agreements.)
    We also proposed to remove Sec.  164.502(e)(1)(iii), which provides 
that a covered entity that violates the satisfactory assurances it 
provided as a business associate of another covered entity will be in 
noncompliance with the Privacy Rule's business associate agreement 
provisions, given that proposed changes to Sec.  164.502 would now 
restrict directly the uses and disclosures of protected health 
information by a business associate, including a covered entity acting 
as a business associate, to those uses and disclosures permitted by its 
business associate agreement.

[[Page 5600]]

    Finally, as discussed above with respect to the definition of 
business associate, we proposed to move the current exceptions to 
business associate to the definition itself in Sec.  160.103.
    Section 164.504(e) contains the specific requirements for business 
associate contracts and other arrangements. We proposed a number of 
modifications to Sec.  164.504(e) to implement section 13404 of the 
HITECH Act and to reflect the Department's new regulatory authority 
with respect to business associates, as well as to reflect a covered 
entity's and business associate's new obligations under Subpart D of 
Part 164 of the Privacy Rule to provide for notification in the case of 
breaches of unsecured protected health information.
    Section 164.504(e)(1)(ii) provides that a covered entity is not in 
compliance with the business associate requirements if the covered 
entity knew of a pattern of activity or practice of the business 
associate that constituted a material breach or violation of the 
business associate's obligation under the contract or other 
arrangement, unless the covered entity took reasonable steps to cure 
the breach or end the violation, as applicable, and if such steps were 
unsuccessful, terminated the contract or arrangement or, if termination 
is not feasible, reported the problem to the Secretary. We proposed to 
remove the requirement that covered entities report to the Secretary 
when termination of a business associate agreement is not feasible. In 
light of a business associate's direct liability for civil money 
penalties for certain violations of the business associate agreement 
and both a covered entity's and business associate's obligations under 
Subpart D to report breaches of unsecured protected health information 
to the Secretary, we have other mechanisms through which we expect to 
learn of such breaches and misuses of protected health information by a 
business associate.
    We also proposed to add a new provision at Sec.  164.504(e)(1)(iii) 
applicable to business associates with respect to subcontractors to 
mirror the requirements on covered entities at Sec.  164.504(e)(1)(ii) 
(minus the requirement to report to the Secretary if termination of a 
contract is not feasible). Thus, a business associate that is aware of 
noncompliance by its business associate subcontractor would be required 
to respond to the situation in the same manner as a covered entity that 
is aware of noncompliance by its business associate. We believe this 
provision would implement section 13404(b) of the HITECH Act, and would 
align the requirements for business associates with regard to business 
associate subcontractors with the requirements for covered entities 
with regard to their business associates.
    We also proposed changes to the specific business associate 
agreement provisions at Sec.  164.504(e). First, we proposed to revise 
Sec.  164.504(e)(2)(ii)(B) through (D) to provide that the contract 
will require that: in (B), business associates comply, where 
applicable, with the Security Rule with regard to electronic protected 
health information; in (C), business associates report breaches of 
unsecured protected health information to covered entities, as required 
by Sec.  164.410; and in (D), in accordance with Sec.  
164.502(e)(1)(ii), business associates ensure that any subcontractors 
that create or receive protected health information on behalf of the 
business associate agree to the same restrictions and conditions that 
apply to the business associate with respect to such information. These 
revisions were proposed to align the requirements for the business 
associate agreement with the requirements in the HITECH Act and 
elsewhere within the HIPAA Rules.
    Additionally, we proposed to add a new agreement provision at Sec.  
164.504(e)(2)(ii)(H) (and to renumber the current paragraphs (H) and 
(I) accordingly) to requires that, to the extent the business associate 
is to carry out a covered entity's obligation under this subpart, the 
business associate must comply with the requirements of the Privacy 
Rule that apply to the covered entity in the performance of such 
obligation. This provision would clarify that when a covered entity 
delegates a responsibility under the Privacy Rule to the business 
associate, the business associate would be contractually required to 
comply with the requirements of the Privacy Rule in the same manner as 
they apply to the covered entity. For example, if a third party 
administrator, as a business associate of a group health plan, fails to 
distribute the plan's notice of privacy practices to participants on a 
timely basis, the third party administrator would not be directly 
liable under the HIPAA Rules, but would be contractually liable, for 
the failure. However, even though the business associate is not 
directly liable under the HIPAA Rules for failure to provide the 
notice, the covered entity remains directly liable for failure to 
provide the individuals with its notice of privacy practices because it 
is the covered entity's ultimate responsibility to do so, despite its 
having hired a business associate to perform the function.
    We also proposed to add a new Sec.  164.504(e)(5) that would apply 
the requirements at Sec.  164.504(e)(2) through (e)(4) to the contract 
or other arrangement between a business associate and its business 
associate subcontractor as required by Sec.  164.502(e)(1)(ii) in the 
same manner as such requirements apply to contracts or other 
arrangements between a covered entity and its business associate. Thus, 
a business associate would be required by Sec.  164.502(e)(1)(ii) and 
by this section to enter into business associate agreements or other 
arrangements that comply with the Privacy and Security Rules with their 
business associate subcontractors, in the same manner that covered 
entities are required to enter into contracts or other arrangements 
with their business associates.
    Finally, we proposed a few other minor changes. We proposed in 
Sec.  164.504(e)(3) regarding other arrangements for governmental 
entities to include references to the Security Rule requirements for 
business associates to avoid having to repeat such provisions in the 
Security Rule. We also proposed to remove the reference to 
subcontractors in Sec.  164.504(f)(2)(ii)(B) (regarding disclosures to 
plan sponsors) and in Sec.  164.514(e)(4)(ii)(C)(4) (regarding data use 
agreements for limited data sets) to avoid confusion since the term 
``subcontractor'' is now a defined term under the HIPAA Rules with a 
particular meaning that is related to business associates. The proposed 
removal of the term was not intended as a substantive change to the 
provisions.
Overview of Public Comments
    Several commenters expressed confusion regarding the need for 
business associate agreements, considering the provisions for direct 
liability from the HITECH Act and in the proposed rule. Many of these 
commenters suggested that all of the requirements of the Privacy Rule 
apply to business associates, as is the case with the Security Rule.
    A few commenters requested clarification about what constitutes 
``satisfactory assurances'' pursuant to the rule, asking whether, for 
example, there were expectations on covered entities to ensure that 
business associates (including subcontractors) have appropriate 
controls in place besides business associate agreements or whether a 
covered entity must obtain from a business associate satisfactory 
assurance that any business associate subcontractors are complying with 
the Rules. Several commenters requested clarification on the 
appropriateness of

[[Page 5601]]

indemnification clauses in business associate agreements.
    Finally, several commenters requested that the Department provide a 
model business associate agreement.
Final Rule
    The final rule adopts the proposed modifications to Sec. Sec.  
164.502(e) and 164.504(e). As we discussed above, while section 13404 
of the HITECH Act provides that business associates are now directly 
liable for civil money penalties under the HIPAA Privacy Rule for 
impermissible uses and disclosures and for the additional HITECH 
requirements in Subtitle D that are made applicable to covered 
entities, it does not apply all of the requirements of the Privacy Rule 
to business associates and thus, the final rule does not. Therefore, 
business associates are not required to comply with other provisions of 
the Privacy Rule, such as providing a notice of privacy practices or 
designating a privacy official, unless the covered entity has chosen to 
delegate such a responsibility to the business associate, which would 
then make it a contractual requirement for which contractual liability 
would attach.
    Concerning commenters' questions about the continued need for 
business associate agreements given the new direct liability on 
business associates for compliance, we note that section 13404 of the 
HITECH Act expressly refers and ties business associate liability to 
making uses and disclosures in accordance with the uses and disclosures 
laid out in such agreements, rather than liability for compliance with 
the Privacy Rule generally. Further, section 13408 of the HITECH Act 
requires certain data transmission and personal health record vendors 
to have in place business associate agreements with the covered 
entities they serve. We also continue to believe that, despite the 
business associate's direct liability for certain provisions of the 
HIPAA Rules, the business associate agreement is necessary to clarify 
and limit, as appropriate, the permissible uses and disclosures by the 
business associate, given the relationship between the parties and the 
activities or services being performed by the business associate. The 
business associate agreement is also necessary to ensure that the 
business associate is contractually required to perform certain 
activities for which direct liability does not attach (such as amending 
protected health information in accordance with Sec.  164.526). In 
addition, the agreement represents an opportunity for the parties to 
clarify their respective responsibilities under the HIPAA Rules, such 
as by establishing how the business associate should handle a request 
for access to protected health information that it directly receives 
from an individual. Finally, the business associate agreement serves to 
notify the business associate of its status under the HIPAA Rules, so 
that it is fully aware of its obligations and potential liabilities.
    With respect to questions about ``satisfactory assurances,'' Sec.  
164.502(e) provides that covered entities and business associates must 
obtain and document the ``satisfactory assurances'' of a business 
associate through a written contract or other agreement, such as a 
memorandum of understanding, with the business associate that meets the 
applicable requirements of Sec.  164.504(e). As discussed above, Sec.  
164.504(e) specifies the provisions required in the written agreement 
between covered entities and business associates, including a 
requirement that a business associate ensure that any subcontractors 
agree to the same restrictions and conditions that apply to the 
business associate by providing similar satisfactory assurances. Beyond 
the required elements at Sec.  164.504(e), as with any contracting 
relationship, business associates and covered entities may include 
other provisions or requirements that dictate and describe their 
business relationship, and that are outside the governance of the 
Privacy and Security Rules. These may or may not include additional 
assurances of compliance or indemnification clauses or other risk-
shifting provisions.
    We also clarify with respect to the satisfactory assurances to be 
provided by subcontractors, that the agreement between a business 
associate and a business associate that is a subcontractor may not 
permit the subcontractor to use or disclose protected health 
information in a manner that would not be permissible if done by the 
business associate. For example, if a business associate agreement 
between a covered entity and a contractor does not permit the 
contractor to de-identify protected health information, then the 
business associate agreement between the contractor and a subcontractor 
(and the agreement between the subcontractor and another subcontractor) 
cannot permit the de-identification of protected health information. 
Such a use may be permissible if done by the covered entity, but is not 
permitted by the contractor or any subcontractors if it is not 
permitted by the covered entity's business associate agreement with the 
contractor. In short, each agreement in the business associate chain 
must be as stringent or more stringent as the agreement above with 
respect to the permissible uses and disclosures.
    Finally, in response to the comments requesting a model business 
associate agreement, we note that the Department has published sample 
business associate provisions on its web site. The sample language is 
designed to help covered entities comply with the business associate 
agreement requirements of the Privacy and Security Rules. However, use 
of these sample provisions is not required for compliance with the 
Rules, and the language should be amended as appropriate to reflect 
actual business arrangements between the covered entity and the 
business associate (or a business associate and a subcontractor).
Response to Other Public Comments
    Comment: Commenters requested guidance on whether a contract that 
complies with the requirements of the Graham Leach Bliley Act (GLBA) 
and incorporates the required elements of the HIPAA Rules may satisfy 
both sets of regulatory requirements. The commenters urged the 
Department to permit a single agreement rather than requiring business 
associates and business associate subcontractors to enter into separate 
GLBA agreements and business associate agreements.
    Response: While meeting the requirements of the GLBA does not 
satisfy the requirements of the HIPAA Rules, covered entities may use 
one agreement to satisfy the requirements of both the GLBA and the 
HIPAA Rules.
    Comment: A few commenters recommended adding an exception to having 
a business associate agreement for a person that receives a limited 
dataset and executes a data use agreement for research, health care 
operations, or public health purposes.
    Response: We have prior guidance that clarifies that if only a 
limited dataset is released to a business associate for a health care 
operations purpose, then a data use agreement suffices and a business 
associate agreement is not necessary. To make this clear in the 
regulation itself, we are adding to Sec.  164.504(e)(3) a new paragraph 
(iv) that recognizes that a data use agreement may qualify as a 
business associate's satisfactory assurance that it will appropriately 
safeguard the covered entity's protected health information when the 
protected health information disclosed for a health care operations 
purpose is a limited data set. A similar provision is not necessary or 
appropriate for disclosures of limited data sets for research or public 
health purposes since such disclosures would

[[Page 5602]]

not otherwise require business associate agreements.
    Comment: A few commenters requested that the Department delete 
Sec.  164.504(e)(2)(ii)(H), which provides that to the extent the 
business associate is to carry out a covered entity's obligation under 
the HIPAA Rules, the business associate must comply with the 
requirements of the HIPAA Rules that apply to the covered entity in the 
performance of the obligation on behalf of the covered entity. 
Alternatively, commenters suggested that the Department clarify that 
the requirements of the section need not be included in business 
associate agreements and that this section does not limit the ability 
of covered entities and business associates to negotiate 
responsibilities with regard to other sections of the Privacy Rule.
    Response: The Department declines to delete Sec.  
164.504(e)(2)(ii)(H). If a business associate contracts to provide 
services to the covered entity with regard to fulfilling individual 
rights or other obligations of the covered entity under the Privacy 
Rule, then the business associate agreement must require the business 
associate to fulfill such obligation in accordance with the Privacy 
Rule's requirements. We do clarify, however, that if the covered entity 
does not delegate any of its responsibilities under the Privacy Rule to 
the business associate, then Sec.  164.504(e)(2)(ii)(H) is not 
applicable and the parties are not required to include such language.
    Comment: One commenter requested that the Department modify Sec.  
164.502(a)(4)(i) to permit business associates to use and disclose 
protected health information for their own health care operations 
purposes, and another commenter requested that the Department clarify 
whether Sec.  164.504(e)(4) provides that a business associate may use 
or disclose protected health information as a covered entity would use 
or disclose the information.
    Response: The Department declines to make the suggested 
modification. Business associates do not have their own health care 
operations (see the definition of health care operations at Sec.  
164.501, which is limited to activities of the covered entity). While a 
business associate does not have health care operations, it is 
permitted by Sec.  164.504(e)(2)(i)(A) to use and disclose protected 
health information as necessary for its own management and 
administration if the business associate agreement permits such 
activities, or to carry out its legal responsibilities. Other than the 
exceptions for the business associate's management and administration 
and for data aggregation services relating to the health care 
operations of the covered entity, the business associate may not use or 
disclose protected health information in a manner that would not be 
permissible if done by the covered entity (even if such a use or 
disclosure is permitted by the business associate agreement).
    Comment: One commenter suggested requiring subcontractors to return 
or destroy all protected health information received from or created 
for a business associate when the contract with the business associate 
is terminated.
    Response: The final rule at Sec.  164.504(e)(5) does apply the 
requirements at Sec.  164.504(e)(2) through (4) (which set forth the 
requirements for agreements between covered entities and their business 
associates) to agreements between business associates and their 
subcontractors. This includes Sec.  164.504(e)(2)(ii)(J), which 
requires the business associate to return or destroy all protected 
health information received from, or created or received on behalf of, 
the covered entity at the termination of the contract, if feasible. 
When this requirement is applied to the agreement between the business 
associate and its business associate subcontractor, the effect is a 
contractual obligation for the business associate subcontractor to 
similarly return or destroy protected health information at the 
termination of the contract, if feasible.
    Comment: One commenter suggested requiring a business associate to 
disclose all subcontractors of the business associate to a covered 
entity within thirty days of the covered entity's request.
    Response: The Department declines to adopt this suggestion as a 
requirement of the HIPAA Rules, because such a requirement would impose 
an undue disclosure burden on business associates. However, covered 
entities and business associates may include additional terms and 
conditions in their contracts beyond those required by Sec.  164.504.
    Comment: One commenter suggested establishing a certification 
process of business associates and subcontractors with regard to HIPAA 
compliance.
    Response: The Department declines to establish or endorse a 
certification process for HIPAA compliance for business associates and 
subcontractors. Business associates and subcontractors are free to 
enlist the services of outside entities to assess their compliance with 
the HIPAA Rules and certification may be a useful compliance tool for 
entities, depending on the rigor of the program. However, certification 
does not guarantee compliance and therefore ``certified'' entities may 
still be subject to enforcement by OCR.
    Comment: One commenter requested clarification on when it is not 
feasible for a business associate to terminate a contract with a 
subcontractor.
    Response: Whether it is feasible for a business associate to 
terminate an agreement with a business associate subcontractor is a 
very fact-specific inquiry that must be examined on a case-by-case 
basis. For example, termination is not feasible for a business 
associate with regard to a subcontractor relationship where there are 
no other viable business alternatives for the business associate (when 
the subcontractor, for example, provides a unique service that is 
necessary for the business associate's operations). See our prior 
guidance on this issue as it applies to covered entities and business 
associates in Frequently Asked Question 236, available at 
https://www.hhs.gov/ocr/privacy/hipaa/faq/business_associates/236.html.
c. Section 164.532--Transition Provisions
Proposed Rule
    We understand that covered entities and business associates are 
concerned with the anticipated administrative burden and cost to 
implement the revised business associate agreement provisions of the 
Privacy and Security Rules. Covered entities may have existing 
contracts that are not set to terminate or expire until after the 
compliance date of the modifications to the Rules, and we understand 
that a six month compliance period may not provide enough time to 
reopen and renegotiate all contracts. In response to these concerns, we 
proposed to relieve some of the burden on covered entities and business 
associates in complying with the revised business associate provisions 
by adding a transition provision to grandfather certain existing 
contracts for a specified period of time. The Department's authority to 
add the transition provision is set forth in Sec.  160.104(c), which 
allows the Secretary to establish the compliance date for any modified 
standard or implementation specification, taking into account the 
extent of the modification and the time needed to comply with the 
modification. The proposed transition period would prevent rushed and 
hasty changes to thousands of on-going existing business associate 
agreements. We addressed the issue of the business associate transition 
provisions as follows.

[[Page 5603]]

    We proposed new transition provisions at Sec.  164.532(d) and (e) 
to allow covered entities and business associates (and business 
associates and business associate subcontractors) to continue to 
operate under certain existing contracts for up to one year beyond the 
compliance date of the revisions to the Rules. The additional 
transition period would be available to a covered entity or business 
associate if, prior to the publication date of the modified Rules, the 
covered entity or business associate had an existing contract or other 
written arrangement with a business associate or subcontractor, 
respectively, that complied with the prior provisions of the HIPAA 
Rules and such contract or arrangement was not renewed or modified 
between the effective date and the compliance date of the modifications 
to the Rules. The proposed provisions were intended to allow those 
covered entities and business associates with valid contracts with 
business associates and subcontractors, respectively, to continue to 
disclose protected health information to the business associate or 
subcontractor, or to allow the business associate or subcontractor to 
continue to create or receive protected health information on behalf of 
the covered entity or business associate, for up to one year beyond the 
compliance date of the modifications, regardless of whether the 
contract meets the applicable contract requirements in the 
modifications to the Rules. With respect to business associates and 
subcontractors, the proposal would grandfather existing written 
agreements between business associates and subcontractors entered into 
pursuant to Sec.  164.504(e)(2)(ii)(D) (which requires the business 
associate to ensure that its agents with access to protected health 
information agree to the same restrictions and conditions that apply to 
the business associate). The Department proposed to deem such contracts 
to be compliant with the modifications to the Rules until either the 
covered entity or business associate has renewed or modified the 
contract following the compliance date of the modifications, or until 
the date that is one year after the compliance date, whichever is 
sooner.
    In cases where a contract renews automatically without any change 
in terms or other action by the parties (also known as ``evergreen 
contracts''), the Department intended that such evergreen contracts 
would be eligible for the extension and that deemed compliance would 
not terminate when these contracts automatically rolled over. These 
transition provisions would have applied to covered entities and 
business associates only with respect to written contracts or other 
written arrangements as specified above, and not to oral contracts or 
other arrangements.
    These transition provisions would have only applied to the 
requirement to amend contracts; they would not affect any other 
compliance obligations under the HIPAA Rules. For example, beginning on 
the compliance date of this rule, a business associate may not use or 
disclose protected health information in a manner that is contrary to 
the Privacy Rule, even if the business associate's contract with the 
covered entity has not yet been amended.
Overview of Public Comments
    Many commenters supported the 1-year extended timeframe for 
compliance with the business associate agreement provisions. Some 
commenters suggested longer timeframes, citing cost and resource 
limitations. Some commenters suggested that the Department should deem 
compliant all business associate agreements that have been renegotiated 
in good faith to meet the February 2010 effective date of the 
applicable provisions in the HITECH Act. Some commenters suggested that 
the Department recognize as compliant business associate agreements 
with provisions requiring compliance with all applicable laws.
Final Rule
    The final rule adopts the proposal, adding new transition 
provisions at Sec.  164.532(d) and (e) to allow covered entities and 
business associates (and business associates and business associate 
subcontractors) to continue to operate under certain existing contracts 
for up to one year beyond the compliance date of the revisions to the 
Rules.
    We decline to provide a longer time for compliance with the 
business associate agreement provisions. We provided a similar 
transition period for revising agreements in the 2002 modifications to 
the HIPAA Rules, and it was our experience that such time was 
sufficient to ease burden on the entities and allow most agreements to 
be modified at the time they would otherwise come up for renewal or 
renegotiation.
    With respect to those business associate agreements that already 
have been renegotiated in good faith to meet the applicable provisions 
in the HITECH Act, covered entities should review such agreements to 
determine whether they meet the final rule's provisions. If they do 
not, these covered entities then have the transition period to make 
whatever additional changes are necessary to conform to the final rule. 
The transition period is also available to those agreements that 
require compliance with all applicable laws (to the extent the 
agreements were otherwise in compliance with the HIPAA Rules prior to 
this final rule), but that do not fully meet the new requirements in 
this final rule. However, we do not deem such contracts as compliant 
beyond the transition period because they would not sufficiently 
reflect the new requirements.
4. Section 164.508--Uses and Disclosures for Which an Authorization Is 
Required
a. Sale of Protected Health Information
Proposed Rule
    Section 164.508 of the Privacy Rule permits a covered entity to use 
and disclose protected health information for purposes not otherwise 
permitted by the Rule if it has obtained a valid written authorization 
from the individual who is the subject of the information. This section 
also specifies two circumstances in which authorization from the 
individual must be obtained: (1) Most uses and disclosures of 
psychotherapy notes; and (2) uses and disclosures for marketing 
purposes.
    Section 13405(d) of the HITECH Act added a third circumstance that 
requires authorization, specifically the sale of protected health 
information. Section 13405(d)(1) prohibits a covered entity or business 
associate from receiving direct or indirect remuneration in exchange 
for the disclosure of protected health information unless the covered 
entity has obtained an individual's authorization pursuant to Sec.  
164.508 that states whether the protected health information can be 
further exchanged for remuneration by the entity receiving the 
information.
    Section 13405(d)(2) contains several exceptions to the 
authorization requirement for circumstances where the purpose of the 
exchange is for: (1) Public health activities, as described at Sec.  
164.512(b) of the Privacy Rule; (2) research purposes as described at 
Sec. Sec.  164.501 and 164.512(i) of the Rule, if the price charged for 
the information reflects the cost of preparation and transmittal of the 
data; (3) treatment of the individual; (4) the sale, transfer, merger 
or consolidation of all or part of a covered entity and for related due 
diligence; (5) services rendered by a business associate pursuant to a

[[Page 5604]]

business associate agreement and at the specific request of the covered 
entity; (6) providing an individual with access to his or her protected 
health information pursuant to Sec.  164.524; and (7) other purposes as 
the Secretary deems necessary and appropriate by regulation. Section 
13405(d)(4) of the Act provides that the prohibition on sale of 
protected health information applies to disclosures occurring six 
months after the date of the promulgation of the final regulations 
implementing this section.
    To implement section 13405(d) of the HITECH Act, we proposed to add 
a general rule at Sec.  164.508(a)(4) requiring a covered entity to 
obtain an authorization for any disclosure of protected health 
information in exchange for direct or indirect remuneration from or on 
behalf of the recipient of the information and to require that the 
authorization state that the disclosure will result in remuneration to 
the covered entity. Consistent with the HITECH Act, the NPRM proposed 
to exclude several disclosures of protected health information made in 
exchange for remuneration from this general rule. As provided in the 
Act, these requirements would also apply to business associates of 
covered entities.
    In the NPRM we did not include language at Sec.  164.508(a)(4) to 
require that the authorization under Sec.  164.508 specify whether the 
protected health information disclosed by the covered entity for 
remuneration could be further exchanged for remuneration by the entity 
receiving the information. The statute refers to obtaining a valid 
authorization that includes a remuneration statement in accordance with 
Sec.  164.508. The remuneration statement required by Sec.  164.508 is 
whether remuneration will be received by the covered entity with 
respect to the disclosures subject to the authorization. This puts the 
individual on notice that the disclosure involves remuneration and 
thus, enables the individual to make an informed decision as to whether 
to sign the authorization. Thus, we interpreted the statute to mean 
that the authorization must include a statement that the covered entity 
is receiving direct or indirect remuneration in exchange for the 
protected health information. We note that these exact words do not 
need to be used in the statement. We provide discretion for covered 
entities to craft appropriate language that reflects, for example, the 
specific type of remuneration they receive. As we explained in the 
NPRM, with respect to the recipient of the information, if protected 
health information is disclosed for remuneration by a covered entity or 
business associate to another covered entity or business associate in 
compliance with the authorization requirements at proposed Sec.  
164.508(a)(4)(i), the recipient covered entity or business associate 
could not redisclose the protected health information in exchange for 
remuneration unless a valid authorization was obtained in accordance 
with proposed Sec.  164.508(a)(4)(i). We requested comment on these 
provisions.
    At proposed Sec.  164.508(a)(4)(ii), we set forth the exceptions to 
the authorization requirement. We proposed the exceptions provided for 
by section 13405(d)(2) of the HITECH Act, and also proposed to exercise 
the authority granted to the Secretary in section 13405(d)(2)(G) to 
include additional exceptions that we deemed to be similarly necessary 
and appropriate. These exceptions are discussed below. We requested 
comment on whether there were additional exceptions that should be 
included in the final regulation.
    First, we proposed to include an exception to cover exchanges for 
remuneration for public health activities pursuant to Sec. Sec.  
164.512(b) or 164.514(e). We added the reference to Sec.  164.514(e) of 
the Privacy Rule to ensure that disclosures of protected health 
information for public health activities in limited data set form would 
also be excepted from the authorization requirement, in addition to 
disclosures that may occur under Sec.  164.512(b) with more 
identifiable information. With respect to the exception for public 
health disclosures, section 13405(d)(3)(A) of the HITECH Act requires 
that the Secretary evaluate the impact on public health activities of 
restricting this exception to require that the price charged for the 
data reflects only the costs of preparation and transmittal of the 
data, including those conducted by or for the use of the Food and Drug 
Administration (FDA). Section 13405(d)(3)(B) further provides that if 
the Secretary finds that such further restriction will not impede 
public health activities, the restriction may then be included in the 
regulations. We did not propose to include such a restriction on 
remuneration in the Rule, but requested public comment to assist us in 
evaluating the impact of doing so.
    The NPRM also included an exception for disclosures of protected 
health information for research purposes, pursuant to Sec. Sec.  
164.512(i) or 164.514(e), in exchange for which the covered entity 
receives only a reasonable, cost based fee to cover the cost to prepare 
and transmit the information for research purposes. Like the public 
health exception, we proposed to add a reference to Sec.  164.514(e) to 
ensure that this exception would also apply to the disclosure of 
protected health information in limited data set form for research 
purposes. We requested public comment on the types of costs that should 
be permitted under this provision.
    We proposed to create an exception from the authorization 
requirement for disclosures of protected health information for 
treatment and payment purposes. Though the Act only addressed 
treatment, we proposed to also except disclosures for payment for 
health care from the remuneration prohibition to make clear that the 
exchange of protected health information to obtain ``payment,'' as such 
term is defined in the Privacy Rule at Sec.  164.501, would not be 
considered a sale of protected health information.
    Consistent with section 13405(d)(2)(D) of the HITECH Act, we 
proposed to except from the authorization requirement disclosures 
described in paragraph (6)(iv) of the definition of health care 
operations at Sec.  164.501, that is, disclosures for the sale, 
transfer, merger, or consolidation of all or part of a covered entity, 
or an entity that following such activity will become a covered entity, 
and due diligence related to such activity.
    We proposed to provide an exception from the authorization 
requirement for disclosures of protected health information to or by a 
business associate for activities that the business associate 
undertakes on behalf of a covered entity pursuant to Sec. Sec.  
164.502(e) and 164.504(e) of the Privacy Rule, as long as the only 
remuneration provided is by the covered entity to the business 
associate for the performance of such activities. This exception would 
exempt from the authorization requirement at Sec.  164.508(a)(4)(i) a 
disclosure of protected health information by a covered entity to a 
business associate or by a business associate to a third party on 
behalf of the covered entity as long as any remuneration received by 
the business associate was for the activities performed by the business 
associate pursuant to a business associate contract.
    We proposed to except from the authorization requirement 
disclosures of protected health information by a covered entity to an 
individual when requested under Sec. Sec.  164.524 (providing a right 
to access protected health information) or 164.528 (providing a right 
to receive an accounting of

[[Page 5605]]

disclosures). While section 13405(d)(2)(F) of the HITECH Act explicitly 
refers only to disclosures under Sec.  164.524, we exercised our 
authority under section 13405(d)(2)(G) of the HITECH Act to likewise 
include in the exception disclosures to the individual under Sec.  
164.528. Section 164.524 permits a covered entity to impose a 
reasonable, cost-based fee for the provision of access to an 
individual's protected health information upon request. Section 164.528 
requires a covered entity to provide a requesting individual with an 
accounting of disclosures without charge in any 12-month period but 
permits a covered entity to impose a reasonable, cost-based fee for 
each subsequent request for an accounting of disclosures during that 
12-month period. Therefore, a disclosure of protected health 
information under Sec.  164.528 is similar to a disclosure under Sec.  
164.524 in that a covered entity may be paid a fee for making the 
disclosure.
    Pursuant to the authority granted to the Secretary in section 
13405(d)(2)(G) of the HITECH Act, we proposed an additional exception 
for disclosures that are required by law as permitted under Sec.  
164.512(a) of the Privacy Rule.
    Finally, we proposed an exception, pursuant to the authority 
granted to the Secretary in section 13405(d)(2)(G), for disclosures of 
protected health information for any other purpose permitted by and in 
accordance with the applicable requirements of the Privacy Rule, as 
long as the only remuneration received by the covered entity is a 
reasonable, cost based fee to cover the cost to prepare and transmit 
the protected health information for such purpose or is a fee otherwise 
expressly permitted by other law. We proposed this exception to ensure 
that the authorization requirement would not deter covered entities 
from disclosing protected health information for permissible purposes 
under the Privacy Rule just because they routinely receive payment 
equal to the cost of preparing, producing, and transmitting the 
protected health information. We emphasized that this proposed 
exception would not apply if a covered entity received remuneration 
above the actual cost incurred to prepare, produce, and transmit the 
protected health information for the permitted purpose, unless such fee 
is expressly permitted by other law.
    As explained in the NPRM, we recognize that many States have laws 
in place to limit the fees a health care provider can charge to 
prepare, copy, and transmit medical records. Under these laws, there is 
great variation regarding the types of document preparation activities 
for which a provider can charge as well as the permissible fee 
schedules for such preparation activities. Some States simply require 
any reasonable costs incurred by the provider in making copies of the 
medical records to be paid for by the requesting party, while other 
States set forth specific cost limitations with respect to retrieval, 
labor, supplies, and copying costs and allow charges equal to actual 
mailing or shipping costs. Many of these State laws set different cost 
limitations based on the amount and type of information to be provided, 
taking into account whether the information is in paper or electronic 
form as well as whether the requested material includes x-rays, films, 
disks, tapes, or other diagnostic imaging. The proposed exception would 
permit recoupment of fees expressly permitted by these other laws.
Overview of Public Comments
    Many commenters asked for clarification on the scope of activities 
that constitute a ``sale of protected health information.'' Several of 
these commenters asked that the final rule include a definition of 
``sale of protected health information'' and argued that the proposed 
language at Sec.  164.508(a)(4) was too broad and had the potential to 
capture a number of activities that should not constitute a ``sale'' of 
protected health information. Commenters made a variety of suggestions 
in this regard, including suggesting that a definition of sale should 
focus on the transfer of ownership of protected health information and 
thus exclude disclosures pursuant to an access agreement, license, or 
lease that appropriately limits a recipient's uses or disclosures of 
the information; or that a definition of sale should more clearly 
capture those disclosures where remuneration is provided in exchange 
for protected health information, rather than all disclosures that may 
involve remuneration. A number of commenters were concerned that fees 
paid for services or programs that involve the disclosure of protected 
health information but that are not fees to purchase the data 
themselves nonetheless would turn such disclosure into a sale of 
protected health information. For example, some commenters were 
concerned that the disclosure of research results to a research sponsor 
would be a sale of protected health information because the sponsor 
paid the covered entity for its services in conducting the research 
study or project. Other commenters expressed concern about the 
authorization requirements for the sale of protected health information 
applying to programs for which a covered entity receives funding and, 
as a condition of that funding, is required to report data, such as 
under the Medicare and Medicaid incentive payment programs for 
meaningful users of certified electronic health record technology and 
certain State grant programs. A few commenters were concerned that the 
exchange of protected health information through a health information 
exchange (HIE) that is paid for through fees assessed on HIE 
participants could be considered sale of protected health information.
    Commenters also asked for clarification on the meaning and scope of 
the term ``direct and indirect remuneration,'' and some were 
particularly concerned that ``indirect remuneration'' meant 
nonfinancial benefits provided in exchange for protected health 
information could turn a disclosure into a sale of protected health 
information. Some commenters stated that prohibiting the receipt of 
indirect remuneration or nonfinancial benefits may eliminate any 
incentive for covered entities to participate in certain collaborative 
research or quality activities, in which covered entities contribute 
data to a centralized database to create aggregate data sets and in 
return may receive a number of nonfinancial benefits, such as the 
ability to use the aggregated information for research or access to 
quality assurance/quality improvement tools. Certain commenters argued 
that the term indirect in the statute modifies the ``receipt'' of 
remuneration (i.e., that the statute also applies to the situation 
where the remuneration is provided by a third party on behalf of the 
recipient of the protected health information) and not the type of 
remuneration.
    The public health exception to the remuneration prohibition 
received a significant amount of support from commenters. Several 
commenters expressed specific support for the proposal to expand the 
exception to also apply to disclosures of limited data sets for public 
health purposes. With respect to the request for comment on the impact 
of restricting this exception to require that the price charged for the 
data reflects on the costs of preparing and transmitting the data, 
commenters were generally opposed to imposing such a restriction. 
Commenters stated that it may be difficult and burdensome to determine 
if some of a covered entity's routine public health reporting involve 
any type of remuneration and

[[Page 5606]]

that a cost-based restriction on remuneration would discourage and 
impede covered entities from making important public health 
disclosures. One commenter was opposed to the public health exception 
altogether, stating that it is a privacy loophole that eliminates 
consumer control over their protected health information.
    Many respondents to the proposed sale prohibition commented on the 
proposed exception for research. While most commenters supported 
including an exception for research disclosures, including disclosures 
of limited data sets for research, many argued that the exception 
should not be limited to the receipt of a reasonable cost-based fee to 
prepare and transmit the data as such a fee limitation could impede 
important research efforts. A number of commenters specifically opposed 
imposing a fee limitation on the disclosure of limited data sets. If a 
fee limitation were retained, commenters argued that it should be 
broadly construed. The majority of commenters on this issue supported 
the proposed exceptions to the remuneration prohibition for treatment 
and health care payment purposes, as necessary so as not to impede 
these core health care functions. Overall, support was also expressed 
by those who commented on the exception for the sale, transfer, merger, 
or consolidation of a covered entity. Further, commenters generally 
agreed that a covered entity should be permitted to disclose protected 
health information without individual authorization as required by law, 
even if remuneration is received in exchange for the disclosure.
    Commenters also submitted a number of comments and questions 
regarding the ability of business associates to receive fees under both 
the proposed exception specifically for fees paid by a covered entity 
to a business associate and the general exception that would allow a 
covered entity to receive a reasonable, cost-based fee to cover the 
costs to prepare and transmit the data or a fee otherwise expressly 
permitted by other law for any disclosure permitted by the Privacy 
Rule. While commenters generally supported these exceptions, commenters 
were concerned that these exceptions appeared not to cover the common 
situation where a business associate, rather than the covered entity, 
receives remuneration from a third party for making a permitted 
disclosure under the Privacy Rule. For example, a number of commenters 
stated that covered entities often outsource to release of information 
(ROI) vendors the processing of requests for copies of medical records 
from third parties and that these vendors and not the covered entities 
bill for the reasonable costs of providing the records to the 
requestors. Commenters asked that the final rule clarify that business 
associates can continue to receive payment of costs from third parties 
for providing this service on behalf of covered entities. Another 
commenter requested that the final rule clarify that the exception for 
remuneration to a business associate for activities performed on behalf 
of a covered entity also applies to remuneration received by 
subcontractors performing services on behalf of business associates.
    Finally, several commenters also responded to the proposed rule's 
request for comment on the general exception at Sec.  
164.508(a)(4)(ii)(H) by suggesting costs that they believed should be 
permitted, including but not limited to costs for: preparing, 
producing, and transmitting protected health information; retrieval, 
labor, supplies, and copying costs; personnel and overhead costs; 
investments and indirect costs; and any costs that are in compliance 
with State law.
Final Rule
    The final rule adopts the HITECH Act's prohibition on the sale of 
protected health information but makes certain changes to the 
provisions in the proposed rule to clarify the scope of the provisions 
and otherwise address certain of commenters' concerns. First, we have 
moved the general prohibition on the sale of protected health 
information by a covered entity or business associate to Sec.  
164.502(a)(5)(ii) and created a definition of ``sale of protected 
health information.'' Numerous commenters requested that the Privacy 
Rule include a definition of sale to better clarify what types of 
transactions fall within the scope of the provisions. Accordingly, 
Sec.  164.502(a)(5)(ii)(B)(1) defines ``sale of protected health 
information'' to generally mean ``a disclosure of protected health 
information by a covered entity or business associate, if applicable, 
where the covered entity or business associate directly or indirectly 
receives remuneration from or on behalf of the recipient of the 
protected health information in exchange for the protected health 
information.'' Section 164.502(a)(5)(ii)(B)(2) then excludes from the 
definition the various exceptions that were in the proposed rule 
(discussed further below).
    We do not limit a ``sale'' to those transactions where there is a 
transfer of ownership of protected health information as some 
commenters suggested. The HITECH Act does not include such a limitation 
and the Privacy Rule rights and protections apply to protected health 
information without regard to ownership interests over the data. Thus, 
the sale provisions apply to disclosures in exchange for remuneration 
including those that are the result of access, license, or lease 
agreements.
    In addition, we do not consider sale of protected health 
information in this provision to encompass payments a covered entity 
may receive in the form of grants, or contracts or other arrangements 
to perform programs or activities, such as a research study, because 
any provision of protected health information to the payer is a 
byproduct of the service being provided. Thus, the payment by a 
research sponsor to a covered entity to conduct a research study is not 
considered a sale of protected health information even if research 
results that may include protected health information are disclosed to 
the sponsor in the course of the study. Further, the receipt of a grant 
or funding from a government agency to conduct a program is not a sale 
of protected health information, even if, as a condition of receiving 
the funding, the covered entity is required to report protected health 
information to the agency for program oversight or other purposes. 
(Certain of these disclosures would also be exempt from the sale 
requirements, depending on whether the requirement to report data was 
included in regulation or other law.) Similarly, we clarify that the 
exchange of protected health information through a health information 
exchange (HIE) that is paid for through fees assessed on HIE 
participants is not a sale of protected health information; rather the 
remuneration is for the services provided by the HIE and not for the 
data itself. (Such disclosures may also be exempt from these provisions 
under the exception for disclosures to or by a business associate that 
is being compensated by a covered entity for its services.) In 
contrast, a sale of protected health information occurs when the 
covered entity primarily is being compensated to supply data it 
maintains in its role as a covered entity (or business associate). 
Thus, such disclosures require the individual's authorization unless 
they otherwise fall within an exception at Sec.  
164.502(a)(5)(ii)(B)(2). For example, a disclosure of protected health 
information by a covered entity to a third party researcher that is 
conducting the research in exchange for remuneration would fall within 
these provisions, unless the only

[[Page 5607]]

remuneration received is a reasonable, cost-based fee to cover the cost 
to prepare and transmit the data for such purposes (see below).
    In response to questions by commenters, we also clarify the scope 
of the term ``remuneration.'' The statute uses the term 
``remuneration,'' and not ``payment,'' as it does in the marketing 
provisions at section 13406(a). Because the statute uses different 
terms, we do not believe that remuneration as applied to the sale 
provisions is limited to financial payment in the same way it is so 
limited in the marketing provisions. Thus, the prohibition on sale of 
protected health information applies to the receipt of nonfinancial as 
well as financial benefits. In response to commenters who indicated 
that the statute's terms ``direct and indirect'' apply to how the 
remuneration is received rather than the remuneration itself, we agree 
and have moved the terms in the definition to further make clear that 
the provisions prohibit the receipt of remuneration not only from the 
third party that receives the protected health information but also 
from another party on behalf of the recipient of the protected health 
information. However, this does not change the scope of the term 
``remuneration.'' As discussed above, we interpret the statute to mean 
that nonfinancial benefits are included in the prohibition. Thus, a 
covered entity or business associate may not disclose protected health 
information in exchange for in kind benefits, unless the disclosure 
falls within one of the exceptions discussed below. Consider, for 
example, a covered entity that is offered computers in exchange for 
disclosing protected health information. The provision of protected 
health information in exchange for the computers would not be 
considered a sale of protected health information if the computers were 
solely used for the purpose of preparing and transmitting protected 
health information to the person collecting it and were returned when 
such disclosure was completed. However, if the covered entity is 
permitted to use the computers for other purposes or to keep the 
computers even after the disclosures have been made, then the covered 
entity has received in kind remuneration in exchange for the protected 
health information above what is needed to make the actual disclosures.
    We retain in the final rule the broad exception for disclosures for 
public health purposes made pursuant to Sec. Sec.  164.512(b) and 
164.514(e). Based on the concerns from the public comment that 
narrowing the exception could discourage voluntary public health 
reporting, we do not limit the exception to only those disclosures 
where all the covered entity receives as remuneration is a cost-based 
fee to cover the cost to prepare and transmit the data.
    With respect to the exception for research disclosures, the final 
rule adopts the language as proposed, including the cost-based fee 
limitation provided for in the HITECH Act. Thus, disclosures for 
research purposes are excepted from the remuneration prohibition to the 
extent that the only remuneration received by the covered entity or 
business associate is a reasonable cost-based fee to cover the cost to 
prepare and transmit the protected health information for such 
purposes. We do not remove the fee limitation as requested by some 
commenters; the statutory language included in Section 13405(d)(2)(B) 
of the HITECH Act clearly states that any remuneration received in 
exchange for research disclosures must reflect only the cost of 
preparation and transmittal of the data for such purpose.
    In response to comments about the types of costs that are permitted 
in the reasonable cost-based fee to prepare and transmit the data, we 
clarify that this may include both direct and indirect costs, including 
labor, materials, and supplies for generating, storing, retrieving, and 
transmitting the protected health information; labor and supplies to 
ensure the protected health information is disclosed in a permissible 
manner; as well as related capital and overhead costs. However, fees 
charged to incur a profit from the disclosure of protected health 
information are not allowed. We believe allowing a profit margin would 
not be consistent with the language contained in Section 13405 of the 
HITECH Act. We intend to work with the research community to provide 
guidance and help the research community reach a common understanding 
of appropriate cost-based limitations on remuneration.
    We retain the exceptions proposed for treatment and payment 
disclosures without modification and agree with commenters that these 
exceptions are necessary to make clear that these core health care 
functions may continue. Similarly, we retain the exception to the 
remuneration prohibition for disclosures for the transfer, merger, or 
consolidation of all or part of a covered entity with another covered 
entity, or an entity that following such activity will become a covered 
entity, and related due diligence, to ensure that such disclosures may 
continue to occur in accordance with the Privacy Rule. We retain the 
proposed exception for disclosures that are otherwise required by law 
to ensure a covered entity can continue to meet its legal obligations 
without imposing an authorization requirement. We also retain the 
exception for disclosures to the individual to provide the individual 
with access to protected health information or an accounting of 
disclosures, where the fees charged for doing so are in accord with the 
Privacy Rule.
    We adopt the exceptions for remuneration paid by a covered entity 
to a business associate for activities performed on behalf of a covered 
entity, as well as the general exception permitting a covered entity to 
receive remuneration in the form of a reasonable, cost-based fee to 
cover the cost to prepare and transmit the protected health information 
for any disclosure otherwise permitted by the Privacy Rule. However, we 
make a number of clarifications to address commenters questions and 
concerns regarding the ability of a business associate rather than a 
covered entity to receive the permitted remuneration. First, we add the 
term ``business associate'' in the general exception permitting 
reasonable, cost-based fees to prepare and transmit data (or fees 
permitted by State laws) to make clear that business associates may 
continue to recoup fees from third party record requestors for 
preparing and transmitting records on behalf of a covered entity, to 
the extent such fees are reasonable, cost-based fees to cover the cost 
to prepare and transmit the protected health information or otherwise 
expressly permitted by other law. Second, we clarify in the business 
associate exception that the exception would also cover remuneration by 
a business associate to its subcontractor for activities performed by 
the subcontractor on behalf of the business associate. Finally, we add 
the term ``business associate'' to the general prohibition on sale of 
protected health information for consistency, even though, without the 
addition, a business associate still would not be permitted to sell 
protected health information as a business associate may generally only 
make uses and disclosures of protected health information in manners in 
which a covered entity would be permitted under the Privacy Rule.
    With respect to the types of costs that would be permitted as part 
of a reasonable, cost-based fee under this provision, we clarify that 
the final rule permits the same types of costs under this exception as 
the research exception, as well as costs that are in compliance with a 
fee schedule provided by State

[[Page 5608]]

law or otherwise expressly permitted by other applicable law. Thus, 
costs may include the direct and indirect costs to prepare and transmit 
the data, including labor, materials, and supplies, but not a profit 
margin. We intend to continue to work with interested stakeholders to 
develop more guidance on direct and indirect costs and on remuneration.
Response to Other Public Comments
    Comment: Several commenters suggested that we make clear in the 
final rule that redisclosures of information by a recipient covered 
entity or business associate even for remuneration that are set forth 
in the original authorization are not restricted by this provision. 
Another commenter argued that the original authorization form should 
indicate whether the recipient of the protected health information will 
further exchange the information for remuneration.
    Response: It is expected to be the usual case that if a covered 
entity or business associate that receives protected health information 
in exchange for remuneration wishes to further disclose that 
information in exchange for remuneration, then an additional 
authorization in accordance with Sec.  164.508 must be obtained because 
such disclosures will not be encompassed by the original authorization. 
However, it may be possible that redisclosures of information for 
remuneration by a recipient covered entity or business associate do not 
require an additional authorization, provided it is sufficiently clear 
to the individual in the original authorization that the recipient 
covered entity or business associate will further disclose the 
individual's protected health information in exchange for remuneration. 
In response to the commenter that argued that the original 
authorization form should indicate whether the recipient of the 
protected health information will further exchange the information for 
remuneration, as explained above we believe the language included in 
Section 13405 of the HITECH Act was to alert the individual as to 
whether the disclosures he or she was authorizing at the time involved 
remuneration. Where the recipient of protected health information 
pursuant to an authorization is a third party that is not a covered 
entity or business associate, we do not have authority to require that 
entity to disclose to the disclosing covered entity or business 
associate whether it plans to further exchange the protected health 
information for remuneration for purposes of including such information 
on the authorization form. However, covered entities that are informed 
of such information may include it on the authorization form if they 
wish to. In any event, the Privacy Rule retains the requirement that an 
authorization inform the individual of the potential for information 
disclosed pursuant to the authorization to be subject to redisclosure 
by the recipient and to no longer be subject to the Privacy Rule.
    Comment: Several commenters asked for clarification on the effect 
the final rule will have on existing research efforts and some 
suggested that HHS should grandfather in all Privacy Rule 
authorizations for research obtained under existing law before the 
effective date of the final rule. These commenters believed addressing 
current research would be necessary to ensure the rule would not 
frustrate ongoing research efforts.
    Response: We agree that ongoing research studies that are based on 
a prior permission under the Privacy Rule for the research use or 
disclosure of protected health information should be grandfathered so 
as not to disrupt these ongoing studies. We have added a reference to 
the authorization requirements that apply to the sale of protected 
health information at Sec.  164.508(a)(4) to make clear that the 
transition provisions in Sec.  164.532 apply to permissions existing 
prior to the applicable compliance date of the Rule. Thus, a covered 
entity may continue to rely on an authorization obtained from an 
individual prior to the compliance date even if remuneration is 
involved but the authorization does not indicate that the disclosure is 
in exchange for remuneration. This would apply to authorizations for 
any permissible purpose under the Rule and not just for research 
purposes. Further, in the research context, where a covered entity 
obtained documentation of a waiver of authorization from an 
Institutional Review Board or Privacy Board prior to the compliance 
date for this final rule, the covered entity may continue to rely on 
that documentation to release protected health information to a 
researcher, even if the covered entity receives remuneration in the 
form of more than a reasonable, cost based fee to prepare and transmit 
the data. Finally, we also provide at new Sec.  164.532(f) that a 
covered entity may continue to use or disclose a limited data set in 
accordance with an existing data use agreement that meets the 
requirements of Sec.  164.514(e), including for research purposes, 
until the data use agreement is renewed or modified or until one year 
from the compliance date of this final rule, whichever is earlier, even 
if such disclosure would otherwise constitute a sale of protected 
health information upon the effective date of this rule.
    Comment: Some commenters were concerned that the sale prohibition 
would apply to a covered entity's sale of accounts receivable including 
protected health information to a collection agency, arguing that such 
disclosures should remain permissible without authorization as a 
payment disclosure.
    Response: Disclosures of protected health information for payment 
collection activities are permitted without authorization as a payment 
disclosure under the Privacy Rule (see Sec. Sec.  164.501 and 
164.506(a)) and thus, are excepted from the remuneration prohibition at 
Sec.  164.502(a)(5)(ii)(B)(2)(iii).
    Comment: A few commenters asked that the final rule clarify that 
transfers of value among entities under common control does not 
implicate the authorization requirements. Similarly, some commenters 
sought clarification on whether business transfers on the books for 
internal reorganization would also be excluded under the transfer, 
merger, and consolidation exception to the final rule.
    Response: First, we clarify that uses of protected health 
information within a covered entity that is a single legal entity are 
not implicated by the remuneration prohibition as the prohibition 
applies only to disclosures outside of a covered entity. Second, the 
use of protected health information among legally separate covered 
entities under common ownership or control that have designated 
themselves as an affiliated covered entity (i.e., a single covered 
entity for purposes of compliance with the HIPAA Rules) is not 
implicated. See the requirements for affiliated covered entities at 
Sec.  164.105(b). Thus, to the extent that what the commenters 
contemplate is an otherwise permissible use of protected health 
information within a single legal entity that is a covered entity or an 
affiliated covered entity, such use of data is not impacted by these 
provisions. Third, disclosures of protected health information for the 
sale, transfer, merger, or consolidation of all or part of a covered 
entity with another covered entity, or with an entity that following 
such activity will become a covered entity and due diligence related to 
such activity are excepted from the definition of sale of protected 
health information at Sec.  164.502(a)(5)(ii)(B)(2)(iv).
    Comment: Some commenters expressed concern over the role the

[[Page 5609]]

Institutional Review Board will play in determining reasonable costs, 
and several commenters asked that the final rule clarify that the 
Institutional Review Board is not responsible for making a 
determination regarding the permissibility of the fees paid in exchange 
for a disclosure of protected health information for research purposes.
    Response: We clarify that a covered entity, or business associate 
if applicable, is responsible for determining whether any fees paid to 
the entity in exchange for protected health information covers the 
covered entity's or business associate's costs to prepare and transmit 
protected health information for research.
    Comment: A few commenters sought clarification on how to 
differentiate access to protected health information from access to 
statistical data, particularly when remuneration is provided for access 
to a database but the party is solely interested in a population study, 
not an individual's protected health information.
    Response: Disclosures of health information that has been de-
identified in accordance with the Privacy Rule at Sec.  164.514(b)-(d) 
are not subject to the remuneration prohibition as such information is 
not protected health information under the Rule. However, a covered 
entity that allows a third party access to a database containing 
protected health information in exchange for remuneration is subject to 
these provisions unless an exception applies (e.g., the remuneration 
received is limited to a reasonable, cost-based fee to prepare and make 
available the data).
    Comment: A number of commenters argued that limited data sets 
should be exempted entirely from the remuneration prohibition because 
they are not fully identifiable data sets and are subject to 
protections under data use agreements.
    Response: We decline to completely exempt limited data sets from 
these provisions as, unlike de-identified data, they are still 
protected health information. However, disclosures of limited data sets 
for purposes permitted under the Rule would be exempt from the 
authorization requirements to the extent the only remuneration received 
in exchange for the data is a reasonable, cost-based fee to prepare and 
transmit the data or a fee otherwise expressly permitted by other law. 
We also provide at new Sec.  164.532(f) that a covered entity may 
continue to use or disclose a limited data set in accordance with an 
existing data use agreement that meets the requirements of Sec.  
164.514(e), including for research purposes, until the data use 
agreement is renewed or modified or until one year from the compliance 
date of this final rule, whichever is earlier, even if such disclosure 
would otherwise constitute a sale of protected health information upon 
the effective date of this rule.
b. Research
i. Compound Authorizations
Proposed Rule
    Section 164.508(b)(4) of the Privacy Rule prohibits covered 
entities from conditioning treatment, payment, enrollment in a health 
plan, or eligibility for benefits on the provision of an authorization. 
This limitation is intended to ensure that authorization from an 
individual for a use or disclosure of protected health information is 
voluntarily provided. However, there are exceptions to this general 
rule for certain circumstances, including in the research context, 
where a covered entity may condition the provision of research-related 
treatment, such as in a clinical trial, on obtaining the individual's 
authorization for the use or disclosure of protected health information 
for such research. Permitting the use of protected health information 
is part of the decision to receive care through a clinical trial, and 
health care providers conducting such trials are able to condition 
research-related treatment on the individual's willingness to authorize 
the use or disclosure of protected health information for research 
associated with the trial.
    Section 164.508(b)(3) generally prohibits what are termed 
``compound authorizations,'' i.e., where an authorization for the use 
and disclosure of protected health information is combined with any 
other legal permission. However, Sec.  164.508(b)(3)(i) carves out an 
exception to this general prohibition, permitting the combining of an 
authorization for a research study with any other written permission 
for the same study, including another authorization or informed consent 
to participate in the research. Nonetheless, Sec.  164.508(b)(3)(iii) 
prohibits combining an authorization that conditions treatment, 
payment, enrollment in a health plan, or eligibility for benefits 
(conditioned authorization) with an authorization for another purpose 
for which treatment, payment, enrollment, or eligibility may not be 
conditioned (unconditioned authorization). This limitation on certain 
compound authorizations was intended to help ensure that individuals 
understand that they may decline the activity described in the 
unconditioned authorization yet still receive treatment or other 
benefits or services by agreeing to the conditioned authorization.
    The impact of these authorization requirements and limitations can 
be seen during clinical trials that are associated with a corollary 
research activity, such as when protected health information is used or 
disclosed to create or to contribute to a central research database or 
repository. For example, Sec.  164.508(b)(3)(iii) prohibits covered 
entities from obtaining a single authorization for the use or 
disclosure of protected health information for a research study that 
includes both treatment as part of a clinical trial and tissue banking 
of specimens (and associated protected health information) collected, 
since the individual generally must sign the authorization for the use 
of his or her protected health information in the clinical trial in 
order to receive the research-related treatment (conditioned 
authorization) but whether the individual also signs the tissue banking 
authorization is completely voluntary and will not affect the 
individual receiving the research-related treatment (unconditioned 
authorization). Thus, covered entities must obtain separate 
authorizations from research participants for a clinical trial that 
also collects specimens with associated protected health information 
for a central repository.
    As stated in the NPRM, various groups, including researchers and 
professional organizations, have expressed concern at this lack of 
integration. A number of persons in the research community have stated 
that requiring separate forms for these corollary research activities 
is inconsistent with current practice under the Common Rule (45 CFR 
Part 46) with respect to obtaining informed consent and creates 
unnecessary documentation burdens. Persons have also indicated that the 
multiple authorization forms are potentially confusing to research 
subjects and/or may dissuade them altogether from participating in a 
clinical trial, and that redundant information on the forms diverts an 
individual's attention from other content that describes how and why 
the personal health information may be used. In light of these 
concerns, the Secretary's Advisory Committee on Human Research 
Protections in 2004 (Recommendation V, in a letter to the Secretary of 
HHS, available at https://www.hhs.gov/ohrp/sachrp/hipaalettertosecy090104.html), as well as the Institute of Medicine in 
its 2009 Report, ``Beyond the HIPAA Privacy Rule: Enhancing Privacy, 
Improving Health Through Research''

[[Page 5610]]

(Recommendation II.B.2), made specific recommendations to allow 
combined authorizations for clinical trials and biospecimen storage.
    To address these concerns and streamline the process in the Privacy 
Rule for obtaining an individual's authorization for research, we 
proposed to amend Sec.  164.508(b)(3)(i) and (iii) to allow a covered 
entity to combine conditioned and unconditioned authorizations for 
research, provided that the authorization clearly differentiates 
between the conditioned and unconditioned research components and 
clearly allows the individual the option to opt in to the unconditioned 
research activities. These provisions would allow covered entities to 
combine authorizations for the use and disclosure of protected health 
information for clinical trials and related biospecimen banking 
activities, as well as other scenarios that often occur in research 
studies.
    While we did not propose to alter the core elements or required 
statements integral to a valid authorization, we stated that covered 
entities would have some flexibility with respect to how they met the 
authorization requirements. For example, covered entities could 
facilitate an individual's understanding of a compound authorization by 
describing the unconditioned research activity on a separate page of a 
compound authorization and could also cross-reference relevant sections 
of a compound authorization to minimize the potential for redundant 
language. In addition, a covered entity could use a separate check-box 
for the unconditioned research activity to signify whether an 
individual has opted-in to the unconditioned research activity, while 
maintaining one signature line for the authorization, or alternatively 
provide a distinct signature line for the unconditioned authorization 
to signal that the individual is authorizing optional research that 
will not affect research-related treatment. We requested comment on 
additional methods that would clearly differentiate to the individual 
the conditioned and unconditioned research activities on the compound 
authorization.
Overview of Public Comments
    Almost all commenters on this topic strongly supported the proposal 
to allow combined authorizations for conditioned and unconditioned 
research activities. Many commenters supported allowing flexibility for 
institutions to determine how best to differentiate the unconditioned 
authorization for the voluntary research activity, including whether to 
use a check box with a single signature line, or separate signature 
lines. Several commenters suggested that an opt out method should be 
permitted as an alternative to an opt in approach.
    A few commenters opposed the proposal to allow compound 
authorizations for conditioned and unconditioned research activities. 
These commenters generally felt that separate authorizations are 
appropriate and that there is not sufficient evidence to suggest that 
combining the forms will be beneficial to individuals.
    The Secretary's Advisory Committee on Human Research Protections, 
in its letter of comment on the Department's NPRM, indicated its 
support for the proposal to permit compound authorizations for 
conditioned and unconditioned research activities, and expressed 
particular appreciation for the goal of harmonization with the Common 
Rule. The Secretary's Advisory Committee on Human Research Protections 
also supported flexibility in the manner that the conditioned and 
unconditioned research activities are differentiated. The Secretary's 
Advisory Committee on Human Research Protections requested 
clarification that the compound authorizations permitted under this 
proposal would be permissible for any type of combined research 
studies, and not exclusively for clinical trials with a biospecimen 
banking component.
Final Rule
    The final rule adopts the proposal to amend Sec.  164.508(b)(3)(i) 
and (iii) to allow a covered entity to combine conditioned and 
unconditioned authorizations for research, provided that the 
authorization clearly differentiates between the conditioned and 
unconditioned research components and clearly allows the individual the 
option to opt in to the unconditioned research activities. We intend 
this provision to allow for the use of compound authorizations for any 
type of research activities, and not solely to clinical trials and 
biospecimen banking, except to the extent the research involves the use 
or disclosure of psychotherapy notes. For research that involves the 
use or disclosure of psychotherapy notes, an authorization for a use or 
disclosure of psychotherapy notes may only be combined with another 
authorization for a use or disclosure of psychotherapy notes. See Sec.  
164.508(b)(3)(ii). Thus, aside from the use of psychotherapy notes, 
combined authorizations could be obtained for the use of protected 
health information in a clinical trial and optional sub-studies, as 
well as for biospecimen banking that also permits future secondary use 
of the data (to the extent the future use authorization is aligned with 
the discussion in the following section regarding authorizations for 
future research). Also, this provision continues to allow for a covered 
entity to combine such authorizations with informed consent documents 
for the research studies.
    The final rule provides covered entities, institutions, and 
Institutional Review Boards with flexibility to determine the best 
approach for clearly differentiating the conditioned and unconditioned 
research activities and giving research participants the option to opt 
in to the unconditioned research activities. We decline to permit a 
combined authorization that only allows the individual the option to 
opt out of the unconditioned research activities (e.g., ``check here if 
you do NOT want your data provided to the biospecimen bank'') because 
an opt out option does not provide individuals with a clear ability to 
authorize the optional research activity, and may be viewed as coercive 
by individuals. The final rule does not remove the requirement that an 
individual affirmatively authorize the unconditioned research 
activities; it merely provides flexibility to streamline the 
authorization process by combining the forms.
    With respect to the commenters that believed there is insufficient 
evidence that combining conditioned and unconditioned research 
activities into a compound authorization would be beneficial, and that 
such compound authorizations may be confusing for patients, as 
indicated above, there have been anecdotal reports to the Department 
that the use of multiple authorization forms has caused confusion among 
research subjects. Further, we note that these modifications do not 
remove the required elements of an authorization that are necessary to 
inform the individual about the study (e.g., description of the 
information to be used or disclosed, description of the purpose, etc.); 
they merely introduce flexibility to avoid redundant language that 
would otherwise be necessary to include in the authorizations for the 
multiple research activities. In addition, these changes are intended 
to align the HIPAA Privacy Rule's authorization requirements with what 
has been common and ongoing practice in terms of the informed consent 
form under the Common Rule.
    We note that covered entities are permitted but not required by the 
modifications adopted at

[[Page 5611]]

Sec.  164.508(b)(3)(i) and (iii) to create compound authorizations for 
conditioned and unconditioned research activities. Previously approved, 
ongoing studies may continue to rely on the separate authorization 
forms that were obtained under the prior provisions. For new studies, 
covered entities and researchers may continue to use separate 
authorizations for conditioned and unconditioned research activities, 
or may transition to compound authorizations as they deem appropriate, 
which can be used beginning on the effective date of this rule.
Response to Other Public Comments
    Comment: The Secretary's Advisory Committee on Human Research 
Protections asked whether the following approaches for distinguishing 
between conditioned and unconditioned research activities would be 
acceptable: Using (1) a combined consent/authorization form for a 
clinical trial and optional banking component, with a check-box for the 
individual to have the choice to opt in to the optional banking 
component, and one signature; (2) a combined consent/authorization form 
for a clinical trial and optional banking component, with one signature 
for the clinical trial and another signature to indicate the individual 
agrees to the optional banking component; and (3) a combined consent/
authorization form for a clinical trial and optional banking component, 
with a check box for the individual to have the choice to opt in to the 
banking component, and one signature, but with detailed information 
about the banking component presented in a separate brochure or 
information sheet that is referenced directly in the consent/
authorization form.
    Response: Covered entities and researchers have flexibility in the 
methods used to distinguish the conditioned and unconditioned research 
activities and to provide the individual with a clear opportunity to 
opt in to the unconditioned portion, and all of the above approaches 
would be acceptable provided, with respect to the third approach, that 
the brochure or information sheet is incorporated by reference into the 
authorization/consent form such that it is considered to be part of the 
form (even if not physically attached to the form). In addition, if the 
brochure or information sheet includes required elements of the 
authorization (or informed consent), and authorization/consent has not 
been altered by an Institutional Review Board, then the brochure or 
information sheet must be made available to potential research 
participants before they are asked to sign the authorization/consent 
document (unless the authorization form itself includes the required 
elements). Finally, in such cases, a covered entity must keep not only 
the signed authorization/consent form, but also a copy of the brochure 
or information sheet, in order to be in compliance with the 
documentation requirements at Sec.  164.530(j).
    Comment: The Secretary's Advisory Committee on Human Research 
Protections requested confirmation that the compound authorization 
proposal would not affect the waiver provisions currently existing in 
the Privacy Rule, such that such provisions could be used, if 
appropriate, for new studies distinct from both the original study and 
the banking activity.
    Response: The new compound authorization provision does not affect 
the waiver of authorization provisions in the Privacy Rule. A covered 
entity may continue to use or disclose protected health information for 
research purposes based on documentation that meets the requirements at 
Sec.  164.512(i), indicating that an Institutional Review Board or 
Privacy Board has waived the obtaining of individual authorization for 
such purposes, based on a determination that (1) the use or disclosure 
of protected health information involves no more than a minimal risk to 
the privacy of individuals; (2) the research could not practicably be 
conducted without the waiver; and (3) the research could not 
practicably be conducted without access to and use of the protected 
health information.
    Comment: The Secretary's Advisory Committee on Human Research 
Protections requested clarification on the effect of revoking only one 
part of a compound authorization. For example, if an individual signs a 
combined authorization for conditioned and unconditioned research 
activities and later specifically revokes only the unconditioned 
research activity (e.g., the banking component), then the covered 
entity may continue to act in reliance on the authorization for the 
conditioned component (e.g., the clinical trial).
    Response: Where it is clear that an individual is revoking only one 
part of a compound authorization, such revocation does not equate to a 
revocation of the entire authorization to include the other studies. 
However, where it is not clear exactly to which research activities the 
individual's revocation applies, written clarification must be obtained 
from the individual in order for the revocation to apply only to 
certain of the research activities identified in the authorization, or 
the entire authorization must be treated as revoked. Further, such 
revocations must be maintained and documented in a manner that will 
ensure uses and disclosures of protected health information for the 
activity to which the revocation applies discontinue, except to the 
extent the covered entity has already acted in reliance on the 
authorization, which would permit certain limited, continued use and 
disclosure, such as necessary to maintain the integrity of the research 
study.
ii. Authorizing Future Research Use or Disclosure
Prior Interpretation
    Research often involves obtaining health information and biological 
specimens to create a research database or repository for future 
research. For example, this frequently occurs where clinical trials are 
paired with corollary research activities, such as the creation of a 
research database or repository where information and specimens 
obtained from a research participant during the trial are transferred 
and maintained for future research. It is our understanding that 
Institutional Review Boards in some cases may approve an informed 
consent document for a clinical trial that also asks research 
participants to permit future research on their identifiable 
information or specimens obtained during the course of the trial. It is 
also our understanding that an Institutional Review Board may in some 
cases review an informed consent for a prior clinical trial to 
determine whether a subsequent research use is encompassed within the 
original consent.
    The Department has previously interpreted the Privacy Rule, 
however, to require that authorizations for research be study specific 
for purposes of complying with the Rule's requirement at Sec.  
164.508(c)(1)(iv) that an authorization must include a description of 
each purpose of the requested use or disclosure. See 67 FR 53182, 
53226, Aug. 14, 2002. In part, the Department's interpretation was 
based on a concern that patients could lack necessary information in 
the authorization to make an informed decision about the future 
research. In addition, it was recognized that not all uses and 
disclosures of protected health information for a future research 
purpose would require a covered entity to re-contact the individual to 
obtain another authorization (e.g., uses or disclosures with a waiver 
of

[[Page 5612]]

authorization from an Institutional Review Board or Privacy Board as 
provided under Sec.  164.512(i) or of a limited data set pursuant to a 
data use agreement under Sec.  164.514(e) for the future research 
purpose).
    Subsequent to issuing this interpretation, the Department heard 
concerns from covered entities and researchers that the Department's 
interpretation encumbers secondary research, and limits an individual's 
ability to agree to the use or disclosure of their protected health 
information for future research. In addition, many commenters noted 
that the Department's interpretation limiting the scope of a HIPAA 
authorization for research appeared to diverge from the current 
practice under the Common Rule with respect to the ability of a 
researcher to seek subjects' informed consent to future research so 
long as the future research uses are described in sufficient detail to 
allow an informed consent. These commenters, as well as the Secretary's 
Advisory Committee on Human Research Protections in 2004 
(Recommendation IV, in a letter to the Secretary of HHS, available at 
https://www.hhs.gov/ohrp/sachrp/hipaalettertosecy090104.html) and the 
Institute of Medicine in its 2009 Report entitled ``Beyond the HIPAA 
Privacy Rule: Enhancing Privacy, Improving Health Through Research'' 
(Recommendation II.B.1), had urged the Department to allow the HIPAA 
authorization to permit future research use and disclosure of protected 
health information.
    Given these concerns, the Department explained in the NPRM that it 
was considering a number of options regarding authorizations for future 
research, including whether the Privacy Rule should: permit an 
authorization for uses and disclosures of protected health information 
for future research purposes to the extent such purposes are adequately 
described in the authorization such that it would be reasonable for the 
individual to expect that his or her protected health information could 
be used or disclosed for such future research; or permit an 
authorization for future research but require certain specific elements 
or statements with respect to the future research, particularly where 
the future research may encompass certain types of sensitive research 
activities, such as research involving genetic analyses or mental 
health research, that may alter an individual's willingness to 
participate in the research. We requested comment on these options and 
on how a revocation would operate with respect to future downstream 
research studies.
Overview of Public Comments
    Almost all commenters on this topic supported the proposal to allow 
authorizations for future research. Many commenters indicated this 
flexibility to be important, particularly considering evolving 
technologies and discoveries.
    About half of these commenters specifically advocated for providing 
investigators and Institutional Review Boards with the maximum 
flexibility to determine the appropriateness of the descriptions for 
future research and felt that this would best align with the Common 
Rule. These commenters were thus against requiring specific statements 
in the Privacy Rule about the future research, including for sensitive 
research. Other commenters were in favor of requiring the additional 
statements about sensitive categories of research, stating that this 
would better inform individuals and give them greater choice in 
determining their willingness to participate in certain types of future 
research. A couple of these commenters recommended working with 
National Committee on Vital and Health Statistics on the categories of 
sensitive research, however no further examples of specific types of 
research were given beyond the examples provided in the proposed rule 
(genetic analyses or mental health research). Several commenters 
specifically advised against requiring specific statements for 
sensitive research, citing concerns of variability in what is 
considered sensitive information and practicality challenges due to the 
changing nature of the concept over time.
    A few commenters opposed the proposal to allow authorizations for 
future research altogether. Some of these commenters felt strongly that 
study-specific authorizations are critical to protect patients, and are 
the only way that individuals can make a truly informed decision. These 
commenters suggested that outreach to patients and potential research 
participants to solicit feedback, as well as a study on the potential 
burdens that enhanced authorizations may have on stakeholders, were 
necessary before any changes were made.
    In its comment letter on the NPRM, the Secretary's Advisory 
Committee on Human Research Protections supported the proposal to 
harmonize HIPAA authorizations with the Common Rule informed consent 
requirements, and also requested consultation with the FDA to ensure 
that authorizations for future research align not only with the Common 
Rule standards but also FDA standards for informed consent. They 
indicated that the authorization should be reasonably specific such 
that individuals are aware of the types of research that may be 
conducted. However, the Secretary's Advisory Committee on Human 
Research Protections emphasized the need for flexibility to rely on 
Institutional Review Board judgment and recommended against requiring 
prescribed statements about certain types of ``sensitive'' research, 
since these concepts change over time and requiring prescribed 
authorization statements may conflict with Institutional Review Boards' 
judgments about how to appropriately describe the research in the 
informed consent.
Modified Interpretation
    We modify the prior Departmental interpretation that research 
authorizations must be study specific. This modification does not make 
any changes to the authorization requirements at Sec.  164.508. A HIPAA 
authorization for future research must still address each of the core 
elements and statements required at Sec.  164.508(c). However, the 
Department no longer interprets the ``purpose'' provision at Sec.  
164.508(c)(1)(iv) as requiring that an authorization for the use or 
disclosure of protected health information for research purposes be 
study specific. In order to satisfy the requirement that an 
authorization include a description of each purpose of the requested 
use or disclosure, an authorization for uses and disclosures of 
protected health information for future research purposes must 
adequately describe such purposes such that it would be reasonable for 
the individual to expect that his or her protected health information 
could be used or disclosed for such future research. This could include 
specific statements with respect to sensitive research to the extent 
such research is contemplated. However, we do not prescribe specific 
statements in the Rule. We agree that it is difficult to define what is 
sensitive and that this concept changes over time. We also agree with 
commenters that this approach best harmonizes with practice under the 
Common Rule regarding informed consent for future research, and allows 
covered entities, researchers and Institutional Review Boards to have 
flexibility in determining what adequately describes a future research 
purpose depending on the circumstances. We have consulted with Office 
for Human Research Protections (OHRP) and the FDA on this approach to 
ensure consistency and

[[Page 5613]]

harmonization with the HHS and FDA human subjects protections 
regulations, where appropriate.
    With respect to commenters that stated it is impossible for 
individuals to be truly informed about future research, we note that we 
are aligning with existing practice under the Common Rule in regard to 
informed consent and still require that all required elements of 
authorization be included in an authorization for future research, even 
if they are to be described in a more general manner than is done for 
specific studies.
    Pursuant to this modified interpretation, covered entities that 
wish to obtain individual authorization for the use or disclosure of 
protected health information for future research may do so at any time 
after the effective date of this final rule. Alternatively, covered 
entities may continue to use only study-specific authorizations for 
research if they choose.
Response to Other Public Comments
    Comment: The Secretary's Advisory Committee on Human Research 
Protections requested flexibility regarding the description in the 
authorization of the information to be used or disclosed for future 
research as well as to whom the covered entity may make the requested 
use or disclosure as there may be some uncertainty of the identity of 
future researchers. The Secretary's Advisory Committee on Human 
Research Protections also suggested that the description of information 
to be collected be allowed to reference information beyond the time of 
the original study, for example ``your future medical records [at 
Hospital]'' or ``your future medical records [relating to diseases/
conditions].''
    Response: Covered entities and researchers have flexibility to 
describe the information to be used or disclosed for the future 
research, so long as it is reasonable from such description to believe 
that the individual would expect the information to be used or 
disclosed for the future research. We also clarify that a description 
of the protected health information to be used for the future research 
may include information collected beyond the time of the original 
study. Further, the Privacy Rule authorization requirements allow a 
``class of persons'' to be described for purposes of identifying in the 
authorization the recipients of the protected health information. Thus, 
covered entities and researchers have flexibility in the manner in 
which they describe the recipients of the protected health information 
for the future research, so long as it is reasonable from such 
description to believe that the individual would expect his or her 
protected health information to be shared with such persons for the 
future research.
    Comment: The Secretary's Advisory Committee on Human Research 
Protections requested that the Department allow for grandfathering of 
existing, ongoing studies that involve the possibility of future/
secondary research, if an Institutional Review Board-approved consent 
reasonably informed the individuals of the future research. In these 
situations, researchers would have needed to obtain a study-specific 
authorization or waiver of authorization before commencing the future/
secondary research that was encompassed in the original informed 
consent.
    Response: Covered entities and researchers may rely on an 
Institutional Review Board-approved consent obtained prior to the 
effective date of this final rule that reasonably informed individuals 
of the future research, provided the informed consent was combined with 
a HIPAA authorization (even though the authorization itself was 
specific to the original study or creation and maintenance of a 
repository).
    Comment: One commenter advocated for the use of time-limited 
authorizations for future research.
    Response: This modification in Departmental interpretation does not 
change the requirement at Sec.  164.508(c)(1)(v), which states that an 
authorization must contain an expiration date or an expiration event 
that relates to the individual or the purpose of the use or disclosure. 
This statement may be a specific time limit, or be ``end of the 
research study,'' ``none,'' or similar language for a research study.
    Comment: Several commenters suggested that revocation of 
authorizations should continue to be permitted in the same manner that 
it is currently allowed under the Privacy Rule. The Secretary's 
Advisory Committee on Human Research Protections recommended that 
revocations of authorization for future research be permitted orally, 
rather than in writing, as is currently required for all authorizations 
under Sec. Sec.  164.508(b)(5) and (c)(2)(i) of the Rule.
    Response: Covered entities may continue to rely on existing 
guidance regarding how revocations of authorizations operate in the 
research context. Such guidance is published in several materials 
available at https://www.hhs.gov/ocr/privacy/hipaa/understanding/special/research/ (see, e.g., the fact sheet entitled, 
``Health Services Research and the HIPAA Privacy Rule''). The 
Department may issue additional guidance in the future with respect to 
revocation policies in the context of authorizations that specify, and 
under which protected health information has been disclosed for, future 
research uses.
    In response to the Secretary's Advisory Committee on Human Research 
Protections recommendation, we also clarify that while the Privacy Rule 
requires that a revocation of authorization from an individual be in 
writing, uses and disclosures pursuant to an authorization are 
permissive and not required, and thus, a covered entity may cease using 
or disclosing protected health information pursuant to an authorization 
based on an individual's oral request if it chooses to do so.
5. Protected Health Information About Decedents
a. Section 164.502(f)--Period of Protection for Decedent Information
Proposed Rule
    Section 164.502(f) requires covered entities to protect the privacy 
of a decedent's protected health information generally in the same 
manner and to the same extent that is required for the protected health 
information of living individuals. Thus, if an authorization is 
required for a particular use or disclosure of protected health 
information, a covered entity may use or disclose a decedent's 
protected health information in that situation only if the covered 
entity obtains an authorization from the decedent's personal 
representative. The personal representative for a decedent is the 
executor, administrator, or other person who has authority under 
applicable law to act on behalf of the decedent or the decedent's 
estate. The Department heard a number of concerns since the publication 
of the Privacy Rule that it can be difficult to locate a personal 
representative to authorize the use or disclosure of the decedent's 
protected health information, particularly after an estate is closed. 
Furthermore, archivists, biographers, and historians had expressed 
frustration regarding the lack of access to ancient or old records of 
historical value held by covered entities, even when there are likely 
few surviving individuals concerned with the privacy of such 
information. Archives and libraries may hold medical records, as well 
as correspondence files, physician diaries and casebooks, and 
photograph collections containing fragments of

[[Page 5614]]

identifiable health information, that are centuries old. Currently, to 
the extent such information is maintained by a covered entity, it is 
subject to the Privacy Rule.
    Accordingly, we proposed to amend Sec.  164.502(f) to require a 
covered entity to comply with the requirements of the Privacy Rule with 
regard to the protected health information of a deceased individual for 
a period of 50 years following the date of death. We also proposed to 
modify the definition of ``protected health information'' at Sec.  
160.103 to make clear that the individually identifiable health 
information of a person who has been deceased for more than 50 years is 
not protected health information under the Privacy Rule. We proposed 50 
years to balance the privacy interests of living relatives or other 
affected individuals with a relationship to the decedent, with the 
difficulty of obtaining authorizations from personal representatives as 
time passes. A 50-year period of protection had also been suggested at 
a National Committee for Vital and Health Statistics (the public 
advisory committee which advises the Secretary on the implementation of 
the Administrative Simplification provisions of HIPAA, among other 
issues) meeting, at which committee members heard testimony from 
archivists regarding the problems associated with applying the Privacy 
Rule to very old records. See https://ncvhs.hhs.gov/050111mn.htm. We 
requested public comment on the appropriateness of this time period.
Overview of Public Comments
    The majority of public comment on this proposal was in favor of 
limiting the period of protection for decedent health information to 50 
years past the date of death. Some of these commenters specifically 
cited the potential benefits to research. A few commenters stated that 
the 50-year period was too long and should be shortened to, for 
example, 25 years. Some supporters of limiting privacy protection for 
decedent information indicated that the date of death is often 
difficult to determine, and thus suggested an alternative time period 
(e.g., 75, 100, 120, 125 years) starting from the last date in the 
medical record, if the date of death is unknown.
    Some commenters were opposed to limiting the period of protection 
for decedent health information due to the continued privacy interests 
of living relatives as well as the decedent, particularly when highly 
sensitive information is involved, including HIV/AIDS status, or 
psychiatric or substance abuse treatment. A couple of commenters 
recommended that there should be no time limit on the protection of 
psychotherapy notes. One commenter expressed concern that this 
modification may encourage covered entities to retain records that they 
would not have otherwise in order to profit from the data after the 50-
year period. One commenter suggested that the period of protection 
should be extended to 100 years, if protections are to be limited at 
all. A few commenters were opposed to the 50-year period of protection 
because they interpreted this provision to be a proposed record 
retention requirement.
Final Rule
    After considering the public comments, the final rule adopts the 
proposal. We believe 50 years is an appropriate period of protection 
for decedent health information, taking into account the remaining 
privacy interests of living individuals after the span of approximately 
two generations have passed, and the difficulty of obtaining 
authorizations from a personal representative of a decedent as the same 
amount of time passes. For the same reason, we decline to shorten the 
period of protection as suggested by some commenters or to adopt a 100-
year period of protection for decedent information. We also believe the 
50-year period of protection to be long enough so as not to provide an 
incentive for covered entities to change their record retention 
policies in order to profit from the data about a decedent once 50 
years has elapsed.
    With respect to commenters' concerns regarding protected health 
information about decedents that is sensitive, such as HIV/AIDS, 
substance abuse, or mental health information, or that involves 
psychotherapy notes, we emphasize that the 50-year period of protection 
for decedent health information under the Privacy Rule does not 
override or interfere with State or other laws that provide greater 
protection for such information, or the professional responsibilities 
of mental health or other providers. Covered entities may continue to 
provide privacy protections to decedent information beyond the 50-year 
period, and may be required to do so under other applicable laws or as 
part of their professional responsibility. Alternatively, covered 
entities may choose to destroy decedent information although other 
applicable law may prescribe or limit such destruction.
    We also decline to limit protections under the Privacy Rule to a 
certain period beyond the last date in the medical record. While we 
appreciate the challenges that may be present in determining the date 
of death of an individual in cases in which it is not sufficiently 
clear from the age of the record whether the individual is deceased, we 
believe that this determination is necessary in closer cases to protect 
the individual, as well as living relatives and others, who may be 
affected by disclosure of the information. Further, as we stated in the 
NPRM, this modification has no impact on a covered entity's disclosures 
permitted under other provisions of the Privacy Rule. For example, a 
covered entity is permitted to disclose protected health information of 
decedents for research that is solely on the information of decedents 
in accordance with Sec.  164.512(i)(1)(iii), without regard to how long 
the individual has been deceased.
    Finally, we clarify that the 50-year period of protection is not a 
record retention requirement. The HIPAA Privacy Rule does not include 
medical record retention requirements and covered entities may destroy 
such records at the time permitted by State or other applicable law. 
(We note that covered entities are subject to the accounting 
requirements at Sec.  164.528 and, thus, would need to retain or record 
certain information regarding their disclosures of protected health 
information.) However, if a covered entity does maintain decedent 
health information for longer than 50 years following the date of death 
of the individual, this information will no longer be subject to the 
Privacy Rule.
b. Section 164.510(b)--Disclosures About a Decedent to Family Members 
and Others Involved in Care
Proposed Rule
    Section 164.510(b) describes how a covered entity may use or 
disclose protected health information to persons, such as family 
members or others, who are involved in an individual's care or payment 
related to the individual's health care. The Department had received a 
number of questions about the scope of the section, specifically with 
regard to disclosing protected health information when the individual 
who is the subject of the information was deceased. We had additionally 
heard concerns that family members, relatives, and others, many of whom 
may have had access to the health information of the deceased 
individual prior to death, have had difficulty obtaining access to such 
information after the death of the individual, because many do not 
qualify as a

[[Page 5615]]

``personal representative'' of the decedent under the Privacy Rule at 
Sec.  164.502(g)(4).
    As such, we proposed to amend Sec.  164.510(b) to add a new 
paragraph (5), which would permit covered entities to disclose a 
decedent's information to family members and others who were involved 
in the care or payment for care of the decedent prior to death, unless 
doing so is inconsistent with any prior expressed preference of the 
individual that is known to the covered entity. We emphasized that 
these modifications would not change the authority of a decedent's 
personal representative with regard to the decedent's protected health 
information. Thus, a personal representative would continue to have a 
right to access the decedent's protected health information relevant to 
such personal representation, and have authority to authorize uses and 
disclosures of the decedent's protected health information that are not 
otherwise permitted or required by the Privacy Rule. We requested 
comment on any unintended consequences that this proposed disclosure 
provision might cause.
Overview of Public Comments
    Most commenters supported the proposal to permit disclosures to 
family members and others involved in the care or payment for care of 
the decedent prior to death, unless doing so is inconsistent with any 
prior expressed preference of the individual that is known to the 
covered entity. These commenters felt that such permissive disclosures 
would help facilitate important and appropriate communications with 
family members and others who had been involved in the individual's 
care or payment for health care prior to the individual's death but who 
may not rise to the level of personal representative. Some commenters 
stated that the provision recognizes the legitimate interest that 
family members may have in a decedent's health information as it 
affects their own health care.
    A few commenters opposed the proposal to expressly permit 
communications with family members and other persons who had been 
involved with the individual's care or payment for care prior to death. 
Two commenters felt it would be a large burden on covered entities to 
determine the legitimacy of a requestor as a family member or 
individual involved in the care or payment for care. One commenter 
questioned the need for family members to have access to decedent 
health information and the likelihood of anyone other than the personal 
representative to have been meaningfully involved in the care or 
payment for care of the decedent.
Final Rule
    The final rule adopts the proposal to amend Sec.  164.510(b) to 
permit covered entities to disclose a decedent's protected health 
information to family members and others who were involved in the care 
or payment for care of the decedent prior to death, unless doing so is 
inconsistent with any prior expressed preference of the individual that 
is known to the covered entity.
    In response to commenters who opposed this provision, we believe 
the provision strikes the appropriate balance in allowing 
communications with family members and other persons who were involved 
in the individual's care or payment for care prior to death, unless 
doing so is inconsistent with the prior expressed wishes of the 
individual. This will ensure family members and others can find out 
about the circumstances surrounding the death of their loved ones, 
unless the individual prior to his or her death objected to the covered 
entity making such communications. Further, the Privacy Rule limits 
such disclosures, similar to the other disclosures permitted under 
Sec.  164.510(b), to the protected health information relevant to the 
family member or other person's involvement in the individual's health 
care or payment for health care. For example, a covered health care 
provider could describe the circumstances that led to an individual's 
passing with the decedent's sister who is asking about her sibling's 
death. In addition, a covered health care provider could disclose 
billing information to a family member of a decedent who is assisting 
with wrapping up the decedent's estate. However, in both of these 
cases, the provider generally should not share information about past, 
unrelated medical problems. Finally, these disclosures are permitted 
and not required, and thus, a covered entity that questions the 
relationship of the person to the decedent or otherwise believes, based 
on the circumstances, that disclosure of the decedent's protected 
health information would not be appropriate, is not required to make 
the disclosure.
Response to Other Public Comments
    Comment: Commenters requested guidance on what it means for a 
person to have been ``involved in the care'' of the decedent prior to 
death. One commenter suggested including language in the final rule 
that would put the burden of proof of ``involvement in the individual's 
care'' on the requestor and not the covered entity, and would hold the 
covered entity harmless when disclosing decedent information in good 
faith in accordance with this new permission.
    Response: We interpret this phrase in the same manner as we have 
with respect to disclosures of protected health information of living 
individuals under Sec.  164.510(b). See the Department's existing 
guidance at https://www.hhs.gov/ocr/privacy/hipaa/understanding/coveredentities/provider_ffg.pdf. Subject to the specified conditions, 
disclosures may be made under this provision to family members, as well 
as to other persons provided the covered entity has reasonable 
assurance the individual prior to death was involved in the 
individual's care or payment for care. Depending on the circumstances, 
this could include disclosures to spouses, parents, children, domestic 
partners, other relatives, or friends of a decedent. As with similar 
disclosures concerning living individuals under Sec.  164.510(b)(1)(i), 
this provision does not generally apply to disclosures to health care 
providers, health plans, public health authorities, law enforcement 
officials, and others whose access to protected health information is 
governed by other provisions of the Privacy Rule.
    We decline to include language in the final rule placing the burden 
of proof on the requestor to demonstrate they were involved in the 
individual's care. In some cases, it will be readily apparent to the 
covered entity that a person is a family member or was involved in the 
individual's care prior to death because the person would have made 
themselves known to the covered entity prior to the individual's death 
by either visiting with or inquiring about the individual, or the 
individual would have identified such person as being involved in their 
care or payment for care to a member of the covered entity's workforce. 
In other cases, the covered entity need just have reasonable assurance 
that the person is a family member of the decedent or other person who 
was involved in the individual's care or payment for care prior to 
death. For example, the person may indicate to the covered entity how 
he or she is related to the decedent or offer sufficient details about 
the decedent's circumstances prior to death to indicate involvement in 
the decedent's care prior to death. As stated above, a covered entity 
that is uncomfortable disclosing protected health information under 
this provision because of questions about the person's

[[Page 5616]]

relationship to the decedent is not required to do so.
    Comment: Several commenters requested and offered suggested 
clarifications on the scope of the terms ``personal representative'' 
and ``family member.''
    Response: The Privacy Rule already identifies the persons who 
qualify as a personal representative of a decedent at Sec.  
164.502(g)(4). Further, this final rule includes a definition of 
``family member'' at Sec.  160.103.
    Comment: A few commenters suggested extending this provision to 
allow disclosures to the decedent's health care ``proxy,'' ``medical 
power of attorney,'' ``power of attorney,'' and ``estate executor.''
    Response: We decline to expand the provision as suggested. Under 
the Privacy Rule, a person with authority under applicable law to act 
on behalf of the decedent or the decedent's estate is the personal 
representative of the decedent. Thus, certain of these persons, such as 
the executor of the estate, already have a right of access to the 
decedent's protected health information. In cases where a person does 
not rise to the level of a personal representative, the final rule at 
Sec.  164.510(b) permits, subject to any prior expressed preference of 
the individual, a covered entity to disclose relevant protected health 
information of the decedent to family members of the decedent or 
persons who otherwise were involved in the individual's care or payment 
for care prior to the individual's death, which may include persons who 
held a health care proxy for the individual or a medical power of 
attorney.
6. Section 164.512(b)--Disclosure of Student Immunizations to Schools
Proposed Rule
    The Privacy Rule, at Sec.  164.512(b), recognizes that covered 
entities must balance protecting the privacy of health information with 
sharing health information with those responsible for ensuring public 
health and safety, and permits covered entities to disclose the minimum 
necessary protected health information to public health authorities or 
other designated persons or entities without an authorization for 
public health purposes specified by the Rule.
    Schools play an important role in preventing the spread of 
communicable diseases among students by ensuring that students entering 
classes have been immunized. Most States have ``school entry laws'' 
which prohibit a child from attending school unless the school has 
proof that the child has been appropriately immunized. Some States 
allow a child to enter school provisionally for a certain period of 
time while the school waits for the necessary immunization information. 
Typically, schools ensure compliance with those requirements by 
requesting the immunization records from parents (rather than directly 
from a health care provider). However, where a covered health care 
provider is requested to send the immunization records directly to a 
school, the Privacy Rule generally requires written authorization by 
the child's parent before a covered health care provider may do so.
    Since the Privacy Rule went into effect, we had heard concerns that 
the requirement for covered entities to obtain authorization before 
disclosing student immunization information may make it more difficult 
for parents to provide, and for schools to obtain, the necessary 
immunization documentation for students, which may prevent students' 
admittance to school. The National Committee on Vital and Health 
Statistics submitted these concerns to the HHS Secretary and 
recommended that HHS regard disclosure of immunization records to 
schools to be a public health disclosure, thus eliminating the 
requirement for authorization. See https://www.ncvhs.hhs.gov/04061712.html. As such, we proposed to amend Sec.  164.512(b)(1) by 
adding a new paragraph that permits covered entities to disclose proof 
of immunization to schools in States that have school entry or similar 
laws.\10\ While written authorization that complies with Sec.  164.508 
would no longer have been required for disclosure of such information 
under the proposal, the covered entity would still have been required 
to obtain agreement, which may have been oral, from a parent, guardian 
or other person acting in loco parentis for the individual, or from the 
individual him- or herself, if the individual is an adult or 
emancipated minor. Because the proposed provision would have permitted 
a provider to accept a parent's oral agreement to disclose immunization 
results to a school--as opposed to a written agreement--the NPRM 
acknowledged a potential for a miscommunication and later objection by 
the parent. We, therefore, requested comment on whether the Privacy 
Rule should require that a provider document any oral agreement under 
this provision to help avoid such problems, or whether a requirement 
for written documentation would be overly cumbersome, on balance. We 
also requested comment on whether the rule should mandate that the 
disclosures go to a particular school official and if so, who that 
should be.
---------------------------------------------------------------------------

    \10\ We note that once a student's immunization records are 
obtained and maintained by an educational institution or agency to 
which the Family Educational Rights and Privacy Act (FERPA) applies, 
the records are protected by FERPA, rather than the HIPAA Privacy 
Rule. See paragraphs (2)(i) and (2)(ii) of the definition of 
``protected health information'' at Sec.  160.103, which exclude 
from coverage under the Privacy Rule student records protected by 
FERPA. In addition, for more information on the intersection of 
FERPA and HIPAA, readers are encouraged to consult the Joint HHS/ED 
Guidance on the Application of FERPA and HIPAA to Student Health 
Records, available at https://www.hhs.gov/ocr/privacy/hipaa/understanding/coveredentities/hipaaferpajointguide.pdf.
---------------------------------------------------------------------------

    In addition, the Privacy Rule does not define the term ``school'' 
and the types of schools subject to the school entry laws may vary by 
State. For example, depending on the State, such laws may apply to 
public and private elementary or primary schools and secondary schools 
(kindergarten through 12th grade), as well as daycare and preschool 
facilities, and post-secondary institutions. Thus, we requested comment 
on the scope of the term ``school'' for the purposes of this section 
and whether we should include a specific definition of ``school'' 
within the regulation itself. In addition, we requested comment on the 
extent to which schools that may not be subject to these school entry 
laws but that may also require proof of immunization have experienced 
problems that would warrant their being included in this category of 
public health disclosures.
Overview of Public Comments
    Most commenters were generally in favor of permitting covered 
entities to disclose student immunization records based on obtaining 
agreement, which may be oral, from a parent, guardian or other person 
acting in loco parentis for the individual, or from the individual 
himself or herself, if the individual is an adult or emancipated minor, 
rather than written authorization. Commenters supported the intent to 
facilitate the transmission of immunization records to ease the burden 
on parents, schools and covered entities, and to minimize the amount of 
school missed by students.
    Some commenters opposed the proposal to require oral or written 
agreement, claiming that a new form of ``agreement'' would introduce 
unnecessary complexity and confusion, and would not help to reduce 
burden. These commenters asserted that covered entities would document 
the verbal agreements for their own liability purposes, even if not 
required by the Privacy Rule. In this manner, the documentation burden 
would still be

[[Page 5617]]

present. Some commenters recommended that instead of an oral agreement 
or authorization requirement, disclosure of immunization records to 
schools should be considered an exempt public health disclosure. A 
small minority of commenters felt that the current authorization system 
should be maintained as it is the best way to ensure patient safety and 
privacy while avoiding miscommunications and misunderstandings.
    Commenters were divided on the issue of requiring written 
documentation of the agreement. Some commenters were in favor of 
documenting oral agreements, citing that the documentation would be 
less cumbersome than obtaining written authorizations while also 
helping to avoid miscommunications. On the other hand, some commenters 
felt that requiring written documentation would be burdensome and would 
eliminate the benefits introduced by permitting oral agreements. Some 
commenters also requested flexibility for covered entities to determine 
whether or not written documentation is appropriate and necessary for 
their purposes.
    The majority of commenters requested that a designated recipient of 
the student immunization records not be defined, and that schools be 
allowed flexibility to identify the appropriate individual(s) that can 
act as the school official permitted to receive the records. Commenters 
indicated that while the disclosures would ideally be made to a nurse 
or licensed health professional at the school, such a health 
professional may not always be present. In such instances, it should be 
permissible that the immunization records be disclosed to another 
official designated by the school as a suitable representative. One 
commenter recommended that the school nurse be designated as the 
recipient and custodian of the records.
    Most commenters recommended that the definition of ``school'' be 
interpreted broadly in order to best support public health efforts. 
Commenters provided suggestions on the types of schools that should be 
included, for example, K-12 schools, public and private schools, and 
post-secondary schools. Many commenters also suggested that daycare, 
preschool and nursery school facilities be encompassed in the 
definition of school. One commenter expressly recommended that child 
care facilities or day care programs not be included in the definition 
of school, despite acknowledging the need to protect the health of 
these children, due to the fact that many States have different laws 
for these settings and are separate from school systems. Two commenters 
suggested defining schools as being open to children up to age 18, 
since students become adults at age 18 and can authorize the disclosure 
of their own information. A few commenters suggested that the 
definition include all schools that require immunization documentation 
as a prerequisite to enrollment, not just those that are subject to 
State entry laws, in order to protect public health in all school 
settings, since the threat of un-immunized children exists regardless 
of State school entry laws. Additionally, some commenters recommended 
that the term ``school'' not be defined in the Privacy Rule due to the 
variation across States in the types of schools that are subject to the 
entry laws.
Final Rule
    The final rule adopts the proposal to amend Sec.  164.512(b)(1) by 
adding a new paragraph that permits a covered entity to disclose proof 
of immunization to a school where State or other law requires the 
school to have such information prior to admitting the student. While 
written authorization will no longer be required to permit this 
disclosure, covered entities will still be required to obtain 
agreement, which may be oral, from a parent, guardian or other person 
acting in loco parentis for the individual, or from the individual 
himself or herself, if the individual is an adult or emancipated minor. 
We believe that the option to provide oral agreement for the disclosure 
of student immunization records will relieve burden on parents, 
schools, and covered entities, and greatly facilitate the role that 
schools play in public health, while still giving parents the 
opportunity to consider whether to agree to the disclosure of this 
information.
    The final rule additionally requires that covered entities document 
the agreement obtained under this provision. The final rule does not 
prescribe the nature of the documentation and does not require 
signature by the parent, allowing covered entities the flexibility to 
determine what is appropriate for their purposes. The documentation 
must only make clear that agreement was obtained as permitted under 
this provision. For example, if a parent or guardian submits a written 
or email request to a covered entity to disclose his or her child's 
immunization records to the child's school, a copy of the request would 
suffice as documentation of the agreement. Likewise, if a parent or 
guardian calls the covered entity and requests over the phone that his 
or her child's immunization records be disclosed to the child's school, 
a notation in the child's medical record or elsewhere of the phone call 
would suffice as documentation of the agreement. We emphasize that the 
agreement is not equivalent to a HIPAA-compliant authorization, and 
covered entities are not required to document a signature as part of 
this requirement. We disagree with comments that documentation would be 
as burdensome on covered entities as written authorization, since an 
authorization form contains many required statements and elements, 
including a signature by the appropriate individual, which are not 
required for the agreement and documentation contemplated here. 
Furthermore, we believe that documentation of oral agreements will help 
to prevent miscommunications and potential future objections by parents 
or individuals, and the concerns that covered entities may have 
regarding liability, penalty or other enforcement actions for 
disclosures made pursuant to an oral agreement.
    Several commenters recommended that in lieu of an oral agreement, 
disclosure of immunization records to schools are presumed to be 
permitted, while giving individuals the option to opt out of this 
presumption or request a restriction to the disclosure. One commenter 
advocated for this public health exemption for disclosure of 
immunization records as being particularly critical for children who 
may be, for example, homeless, living with someone other than a parent 
or legal guardian, or living with a parent that does not speak English. 
We remove the written authorization requirement to help facilitate 
these disclosures with as much flexibility as possible. However, we do 
not intend this provision to change the current practice of parents, 
guardians, or other persons acting in loco parentis contacting a 
child's health care provider to request proof of immunization be sent 
to the child's school. Therefore, we still require active agreement 
from the appropriate individual, and a health care provider may not 
disclose immunization records to a school under this provision without 
such agreement. The agreement must be an affirmative assent or request 
by a parent, guardian, or other person acting in loco parentis (or by 
an adult individual or emancipated minor, if applicable) to the covered 
entity, which may be oral and over the phone, to allow the disclosure 
of the immunization records. A mere request by a school to a health 
care provider for the immunization records of a student would not be 
sufficient to permit disclosure under this provision (and

[[Page 5618]]

such a request by a school might also raise implications under other 
laws, such as FERPA).
    We decline to include definitions of ``school official'' and 
``school'' in the final rule. The motivation for this new permissive 
disclosure is to promote public health by reducing the burden 
associated with providing schools with student immunization records and 
we do not wish to create additional difficulties or confusion in doing 
so. We therefore agree with commenters that schools are best equipped 
to determine the appropriate individual to receive student immunization 
records at their location and will benefit from having this 
flexibility. We also agree with commenters that ``school'' should 
remain undefined in the Privacy Rule due to the variation across States 
in the types of schools that are subject to the entry laws. We believe 
that this will best align with State law and cause the least amount of 
confusion. We did not receive sufficient comment regarding the breadth 
of schools that are not subject to school entry laws or the burden that 
these institutions face to justify expanding this provision to allow 
disclosure of proof of immunization to such schools without an 
authorization.
Response to Other Public Comments
    Comment: Several commenters raised concerns about the dynamic 
between the Privacy Rule requirements and State law requirements 
regarding immunization disclosures. Commenters indicated that some 
State laws require providers to directly share immunization records 
with schools and provide parents with the opportunity to opt out of 
this direct sharing. Commenters also indicated the use of State 
immunization registries in many States, to which schools are permitted 
direct access. One commenter suggested that the Privacy Rule permit 
State law to determine what is the minimum necessary for proof of 
immunization.
    Response: We take this opportunity to clarify that the Privacy Rule 
at Sec.  164.512(a) permits a covered entity to use or disclose 
protected health information to the extent that such use or disclosure 
is required by law and the use or disclosure complies with and is 
limited to the relevant requirements of such law. As such, the Privacy 
Rule does not prohibit immunization disclosures that are mandated by 
State law, nor does it require authorization for such disclosures. With 
regard to State laws that require covered entities to disclose 
immunization records to schools and allow parents to opt out, this is 
not in any way prohibited by the Privacy Rule. However, with regard to 
State laws that permit but do not require covered entities to disclose 
immunization records to schools, this does not meet the requirements of 
the provisions at Sec.  164.512(a), and disclosures of immunization 
records are subject to the Privacy Rule agreement and documentation 
requirements described in this part. We also note that the Privacy Rule 
at Sec.  164.512(b) permits a covered entity to disclose protected 
health information for public health activities. Disclosures of 
protected health information to State immunization registries are 
therefore permitted by the Privacy Rule and also do not require 
authorization. The Privacy Rule at Sec.  164.514(d)(3)(iii)(A) provides 
that a covered entity, when making a permitted disclosure pursuant to 
Sec.  164.512 to a public official, may determine, if such a 
determination is reasonable under the circumstances, that information 
requested by a public official is the minimum necessary information for 
the stated purpose, if the public official represents that the 
information requested is the minimum necessary for the stated 
purpose(s). Under this provision, a covered entity may rely on State 
law or a State official's determination of the minimum necessary 
information required for proof of immunization, unless such 
determination is unreasonable.
    Comment: Commenters requested guidance on when and how often to 
obtain agreement for immunization disclosures.
    Response: We anticipate that covered entities will obtain agreement 
for the disclosure of immunization records on a case-by-case basis as 
needed. For example, a parent may call and request that a covered 
entity provide his or her child's immunization records before the child 
begins elementary school, if required by State school entry laws. If 
that child moves to a different school and is unable to transfer their 
immunization records to the new school, the parent may need to request 
that the covered entity provide his or her child's immunization records 
to the new school, if required by State school entry laws. A parent 
might also generally indicate to a covered entity that he or she 
affirmatively agrees to the immediate or future disclosure of his or 
her child's immunization records to the child's school as necessary, or 
the continued disclosure of such information if, for example, updates 
are required by the school when a series of vaccinations have been 
completed.
    Comment: Commenters requested clarification on the length of time 
an agreement may be relied upon.
    Response: An agreement to permit the disclosure of immunization 
records is considered effective until revoked by the parent, guardian 
or other person acting in loco parentis for the individual, or by the 
individual himself or herself, if the individual is an adult or 
emancipated minor.
    Comment: Commenters requested clarification regarding any 
requirement for schools to maintain the immunization records.
    Response: The Privacy Rule does not require schools to keep student 
immunization records; however individual State or other laws may 
require this.
7. Section 164.514(f)--Fundraising
Proposed Rule
    Section 164.514(f)(1) of the Privacy Rule permits a covered entity 
to use, or disclose to a business associate or an institutionally 
related foundation, the following protected health information about an 
individual for the covered entity's fundraising from that individual 
without the individual's authorization: (1) Demographic information 
relating to an individual; and (2) the dates of health care provided to 
an individual. Section 164.514(f)(2) of the Privacy Rule requires a 
covered entity that plans to use or disclose protected health 
information for fundraising under this paragraph to inform individuals 
in its notice of privacy practices that it may contact them to raise 
funds for the covered entity. In addition, Sec.  164.514(f)(2) requires 
that a covered entity include in any fundraising materials it sends to 
an individual a description of how the individual may opt out of 
receiving future fundraising communications and that a covered entity 
must make reasonable efforts to ensure that individuals who do opt out 
are not sent future fundraising communications.
    Section 13406(b) of the HITECH Act requires the Secretary to 
provide by rule that a covered entity provide the recipient of any 
fundraising communication with a clear and conspicuous opportunity to 
opt out of receiving any further fundraising communications. 
Additionally, section 13406(b) states that if an individual does opt 
out of receiving further fundraising communications, the individual's 
choice to opt out must be treated as a revocation of authorization 
under Sec.  164.508 of the Privacy Rule.
    In the NPRM, we proposed a number of changes to the Privacy Rule's 
fundraising requirements to implement the statutory provisions. First, 
we proposed to strengthen the opt out by

[[Page 5619]]

requiring that a covered entity provide, with each fundraising 
communication sent to an individual under these provisions, a clear and 
conspicuous opportunity for the individual to elect not to receive 
further fundraising communications. To satisfy this requirement, we 
also proposed to require that the method for an individual to elect not 
to receive further fundraising communications may not cause the 
individual to incur an undue burden or more than nominal cost. We 
encouraged covered entities to consider the use of a toll-free phone 
number, an email address, or similar opt out mechanism that would 
provide individuals with a simple, quick, and inexpensive way to opt 
out of receiving future communications. We noted that we considered 
requiring individuals to write a letter to opt out to constitute an 
undue burden on the individual.
    We also proposed to provide that a covered entity may not condition 
treatment or payment on an individual's choice with respect to 
receiving fundraising communications. We believed this modification 
would implement the language in section 13406(b) of the HITECH Act that 
provides that an election by an individual not to receive further 
fundraising communications shall be treated as a revocation of 
authorization under the Privacy Rule.
    Further, we proposed to provide that a covered entity may not send 
fundraising communications to an individual who has elected not to 
receive such communications. This would strengthen the current 
requirement at Sec.  164.514(f)(2)(iii) that a covered entity make 
``reasonable efforts'' to ensure that those individuals who have opted 
out of receiving fundraising communications are not sent such 
communications. The NPRM proposed stronger language to make clear the 
expectation that covered entities abide by an individual's decision not 
to receive fundraising communications, as well as to make the 
fundraising opt out operate more like a revocation of authorization, 
consistent with the statutory language and legislative history of 
section 13406(b) of the HITECH Act discussed above.
    With respect to the operation of the opt out, we requested comment 
regarding to what fundraising communications the opt out should apply 
(i.e., should the opt out apply to all future fundraising 
communications or should and can the opt out be structured in a way to 
apply only to the particular fundraising campaign described in the 
letter). We also requested comment on whether the Rule should allow a 
similar method, short of the individual signing an authorization, by 
which an individual who has previously opted out can put his or her 
name back on an institution's fundraising list.
    We proposed to retain the requirement that a covered entity that 
intends to contact the individual to raise funds under these provisions 
include a statement to that effect in its notice of privacy practices. 
However, we proposed that the required statement also inform 
individuals that they have a right to opt out of receiving such 
communications.
    In addition to the above modifications, we requested public comment 
on the requirement at Sec.  164.514(f)(1) which limits the information 
a covered entity may use or disclose for fundraising to demographic 
information about and dates of health care service provided to an 
individual. Since the promulgation of the Privacy Rule, we acknowledged 
that certain covered entities have raised concerns regarding this 
limitation, maintaining that the Privacy Rule's prohibition on the use 
or disclosure of certain treatment information without an 
authorization, such as the department of service where care was 
received and outcomes information, impedes their ability to raise funds 
from often willing and grateful patients because they are unable to 
target their fundraising efforts and avoid inappropriate solicitations 
to individuals who may have had a bad treatment outcome. Such entities 
have argued that obtaining an individual's authorization for 
fundraising as the individual enters or leaves the hospital for 
treatment is often impracticable or inappropriate. The proposed rule 
also discussed the fact that the National Committee on Vital and Health 
Statistics held a hearing and heard public testimony on this issue in 
July 2004 and recommended to the Secretary that the Privacy Rule should 
allow covered entities to use or disclose information related to the 
patient's department of service (broad designations, such as surgery or 
oncology, but not narrower designations or information relating to 
diagnosis or treating physician) for fundraising activities without 
patient authorization. The National Committee on Vital and Health 
Statistics also recommended that a covered entity's notice of privacy 
practices inform patients that their department of service information 
may be used in fundraising, and that patients should be afforded the 
opportunity to opt out of the use of their department of service 
information for fundraising or all fundraising contacts altogether. See 
https://www.ncvhs.hhs.gov/040902lt1.htm.
    In light of these concerns and the prior recommendation of the 
National Committee on Vital and Health Statistics, we asked for public 
comment on whether and how the current restriction on what information 
may be used and disclosed should be modified to allow covered entities 
to more effectively target fundraising and avoid inappropriate 
solicitations to individuals, as well as to reduce the need to send 
solicitations to all patients. In particular, we solicited comment on: 
(1) Whether the Privacy Rule should allow additional categories of 
protected health information to be used or disclosed for fundraising, 
such as department of service or similar information, and if so, what 
those categories should be; (2) the adequacy of the minimum necessary 
standard to appropriately limit the amount of protected health 
information that may be used or disclosed for fundraising purposes; or 
(3) whether the current limitation should remain unchanged. We also 
solicited comment on whether, if additional information is permitted to 
be used or disclosed for fundraising absent an authorization, covered 
entities should be required to provide individuals with an opportunity 
to opt out of receiving any fundraising communications before making 
the first fundraising solicitation, in addition to the opportunity to 
opt out with every subsequent communication. We invited public comment 
on whether such a pre-solicitation opt out would be workable for 
covered entities and individuals and what mechanisms could be put into 
place to implement the requirement.
Overview of Public Comments
    In general, the public comments received in response to the NPRM 
were supportive of the proposed modifications but many asked that the 
final rule give covered entities flexibility with respect to 
operationalizing these requirements. Several commenters provided 
examples of routine communications and expressed the need for guidance 
and clarification about what constitutes a fundraising communication.
    Generally, most commenters supported the NPRM's proposed 
requirement that the method through which the covered entity permits 
individuals to opt out of receiving future fundraising communications 
not cause individuals to incur an undue burden or more than a nominal 
cost. Many commenters stated that the final rule should give covered 
entities the flexibility to determine which opt out

[[Page 5620]]

methods will work best given their circumstances, instead of requiring 
all covered entities to employ specific opt out methods. These 
commenters noted that depending on the size of the covered entity and 
type of population it serves, certain opt out methods might not be 
feasible, such as one that requires the establishment of a toll-free 
number, which may be cost prohibitive for some small entities. 
Similarly, some commenters noted that because not all individuals have 
access to a computer and the Internet, providing individuals with the 
opportunity to opt out via email alone may not be sufficient.
    With respect to the scope of the opt out, the commenters were 
generally split on whether the opt out should apply to communications 
related to a specific fundraising campaign or to all future fundraising 
communications. The commenters in support of applying the opt out to a 
specific fundraising campaign stated that it would be too difficult for 
individuals to make a meaningful decision about whether they wanted to 
opt out of all future fundraising communications, and allowing 
individuals to opt out of all futurefundraising communications would 
greatly hinder a covered entity's ability to raise funds. Those 
commenters in favor of implementing an all or nothing opt out stated 
that it would be too difficult for covered entities, especially large 
facilities, to track campaign-specific opt outs for each individual, so 
applying the opt out universally would make it much easier for covered 
entities to implement. Other commenters asked that the final rule take 
a flexible approach and permit covered entities to decide the scope of 
the opt out, while others stated that the final rule should require 
covered entities to include both opt out options on each fundraising 
communication leaving the decision to individuals.
    Additionally, while most commenters supported the prohibition on 
conditioning treatment or payment on an individual's choice regarding 
the receipt of fundraising communications, most commenters opposed the 
NPRM's proposal that prohibited covered entities from sending future 
fundraising communications to those individuals who had opted out and 
stated that it was too strict. The majority of these commenters 
suggested that the final rule retain the Privacy Rule's original 
``reasonable efforts'' language and stated that while covered entities 
have every incentive not to send fundraising communications to those 
individuals who have opted out of receiving them, it is very difficult 
for covered entities to ensure 100 percent accuracy with this policy. 
Several commenters stated that there are lag times between the period 
of time in which a fundraising mailing list is compiled and the time in 
which a fundraising communication is sent out, so if an individual has 
opted out during the interim time period, covered entities may not be 
able to prevent the prepared fundraising communication from being sent. 
Other commenters stated that it may be difficult to implement an opt 
out across all records belonging to that individual where 
complications, such as name changes and variation, address changes, and 
multiple addresses are involved.
    For those individuals who have opted out of receiving fundraising 
communications, commenters generally supported allowing those 
individuals to opt back in to receiving such communications. Some 
suggested that individuals be able to opt back in using the same 
methods they used to opt out, while others suggested that any 
communication indicating a willingness to resume receiving fundraising 
communications, such as making a donation to the covered entity, should 
function as an opt in. Other commenters suggested that the final rule 
limit the amount of time that an individual can opt out, such that 
after this period of time the individual automatically begins receiving 
fundraising communications again. A few commenters were opposed to 
permitting individuals to opt back in to receive fundraising 
communications, stating that this would be too costly and burdensome 
for covered entities to track.
    With respect to the requests for public comments regarding the 
potential use or disclosure of additional protected health information 
to provide more targeted fundraising communications, the vast majority 
of commenters supported allowing the use or disclosure of additional 
protected health information for fundraising. These commenters stated 
that the use of additional protected health information would 
streamline their fundraising efforts and ensure that individuals were 
sent communications about campaigns that would be meaningful to their 
experiences. These commenters also stated that it would eliminate the 
concern of sending a communication to an individual or family that 
suffered a negative outcome. Commenters suggested several categories of 
protected health information that covered entities should be able to 
use to target their fundraising efforts, including department or site 
of service, generic area of treatment, department where last seen, 
outcome information, treating physician, diagnosis, whether the 
individual was a pediatric or adult patient, medical record number, 
Social Security number, or other unique identifier, and any other 
information that reflects the fact that the individual was served by 
the covered entity.
    With respect to the minimum necessary standard, a few commenters 
supported its use to limit any additional categories of protected 
health information that can be used to target a covered entity's 
fundraising efforts. These commenters supported the use of the standard 
because of how familiar and comfortable most covered entities are at 
applying the minimum necessary standard. However, another commenter was 
opposed to the use of the minimum necessary standard, stating that it 
is not uniformly applied across covered entities.
    Despite the general support for the use of additional protected 
health information, a small minority of commenters opposed allowing the 
use of additional protected health information to target fundraising 
efforts, citing privacy concerns with doing so. One commenter opposed 
expanding the information that could be used for fundraising in cases 
where outside fundraising entities are used, including those with whom 
the covered entity has executed business associate agreements.
    All commenters were opposed to requiring covered entities to 
provide a pre-solicitation opt out to individuals and stated that 
permitting individuals to opt out in the first fundraising 
communication is sufficient. Several commenters noted that the proposed 
revision to the notice of privacy practices to require a covered entity 
to inform individuals of their right to opt out of receiving 
fundraising communications effectively functions as a pre-solicitation 
opt out, so individuals who wish to opt out of receiving such 
communications immediately can do so upon receipt of the notice.
Final Rule
    We generally adopt the proposals in the final rule, as well as 
allow certain additional types of protected health information to be 
used or disclosed for fundraising purposes.
    With respect to the commenters who expressed confusion over what 
constitutes a fundraising communication, we emphasize that the final 
rule does nothing to modify the types of communications that are 
currently considered to be for fundraising purposes. A communication to 
an individual that is made by a covered entity, an institutionally 
related foundation, or a business associate on behalf of the covered 
entity for the

[[Page 5621]]

purpose of raising funds for the covered entity is a fundraising 
communication for purposes of Sec.  164.514(f). The Department has 
stated that ``[p]ermissible fundraising activities include appeals for 
money, sponsorship of events, etc. They do not include royalties or 
remittances for the sale of products of third parties (except auctions, 
rummage sales, etc.).'' See 65 FR 82718. Additionally, the Privacy Rule 
has always required that such communications contain a description of 
how the individual may opt out of receiving further fundraising 
communications (Sec.  164.514(f)(2)(ii)).
    With respect to the proposed requirement that the method for an 
individual to elect not to receive further fundraising communications 
should not cause the individual to incur an undue burden or more than a 
nominal cost, we generally agree with the commenters who suggested that 
the final rule be flexible and not prescriptive. Under the final rule, 
covered entities are free to decide what methods individuals can use to 
opt out of receiving further fundraising communications, as long as the 
chosen methods do not impose an undue burden or more than a nominal 
cost on individuals. Covered entities should consider the use of a 
toll-free phone number, an email address, or similar opt out mechanisms 
that provide individuals with simple, quick, and inexpensive ways to 
opt out of receiving further fundraising communications. Covered 
entities may employ multiple opt out methods, allowing individuals to 
determine which opt out method is the simplest and most convenient for 
them, or a single method that is reasonably accessible to all 
individuals wishing to opt out.
    In response to commenters who expressed concern about the cost of 
setting up a toll-free phone number, we clarify that covered entities 
may require individuals who wish to opt out of further fundraising 
communications to do so through other methods, (e.g., through the use 
of a local phone number), where appropriate, as long as the method or 
methods adopted do not impose an undue burden or cost on the 
individual. We encourage covered entities to consider the size of the 
population to which they are sending the communications, the geographic 
distribution, and any other factors that may help determine which opt 
out method(s) is most appropriate and least burdensome to individuals.
    We continue to consider requiring individuals to write and send a 
letter to the covered entity asking not to receive further fundraising 
communications to constitute an undue burden. However, requiring that 
individuals opt out of further fundraising communications by simply 
mailing a pre-printed, pre-paid postcard would not constitute an undue 
burden under the final rule and is an appropriate alternative to the 
use of a phone number or email address.
    Regarding the scope of the opt out, the commenters were split on 
whether the opt out should apply to all future fundraising 
communications or to a specific fundraising campaign. The final rule 
leaves the scope of the opt out to the discretion of covered entities. 
For those covered entities that expressed concern about the ability to 
track campaign-specific opt outs, they have the discretion to apply the 
opt out to all future fundraising communications. Likewise, those 
covered entities that prefer, and have the ability to track, campaign-
specific opt outs are free to apply the opt out to specific fundraising 
campaigns only. Covered entities are also free to provide individuals 
with the choice of opting out of all future fundraising communications 
or just campaign-specific communications. Whatever method is employed, 
the communication should clearly inform individuals of their options 
and any consequences of electing to opt out of further fundraising 
communications.
    Despite the commenters who did not support the strengthened 
language in the NPRM prohibiting covered entities from sending further 
fundraising communications to those individuals who have already opted 
out, the final rule adopts this provision without modification. While 
many commenters supported the current ``reasonable efforts'' standard 
and cited several reasons that may make it difficult to attain the 
proposed standard, we adopt the proposed standard because it is 
consistent with the statute and more protective of an individual's 
right to elect not to receive further fundraising communications. For 
example, some commenters cited lag times between the creation of 
mailing lists and the receipt or update of opt out lists and difficulty 
in accurately identifying individuals on the fundraising lists due to 
name changes or variations and multiple addresses. These issues are 
common to the management of the medical or billing records and 
effectuating revocations of authorization, requests for access, and 
other general communications between the entity and the individual. We 
expect the same care and attention to the handling of protected health 
information in fundraising communications as is necessary for the 
proper handling of this information in all other health care operations 
performed by the covered entity. Covered entities voluntarily choosing 
to send fundraising communications to individuals must have data 
management systems and processes in place to timely track and flag 
those individuals who have opted out of receiving fundraising 
communications to ensure that they are not sent additional fundraising 
communications.
    The majority of commenters supported allowing a process for 
individuals who have opted out of receiving further fundraising 
communications to opt back in and the final rule at Sec.  
164.514(f)(2)(v) permits covered entities have one. Like the discretion 
given to covered entities regarding the methods through which an 
individual can opt out, the final rule gives covered entities the 
discretion to determine how individuals should be able to opt back in. 
For example, a covered entity could include as a part of a routine 
newsletter sent to all patients a phone number individuals can call to 
be put on a fundraising list.
    While some commenters suggested that opt outs should be time 
limited such that an individual automatically opts back in after a 
certain period of time, we do not believe that an individual's election 
not to receive further fundraising communications is something that 
should automatically lapse. Because the individual has actively chosen 
to opt out, only a similar active decision by the individual to opt 
back in will suffice. Additionally, where an individual who has opted 
out of fundraising communications makes a donation to a covered entity, 
it does not serve, absent a separate election to opt back in, to 
automatically add the individual back onto the mailing list for 
fundraising communications.
    The Privacy Rule currently permits covered entities to use or 
disclose only demographic information relating to the individual and 
dates of health care provided to the individual for fundraising 
communications. In response to several commenters who asked for 
clarification regarding the scope of demographic information, the final 
rule, at Sec.  164.514(f)(1)(i), clarifies that demographic information 
relating to an individual includes names, addresses, other contact 
information, age, gender, and dates of birth. Although much of this 
information was listed in the preamble to the 2000 final rule (65 FR 
82718) as being demographic information with respect to the fundraising 
provisions, we have added this information to the regulatory text for 
clarity. Additionally, we have included date of birth as demographic 
information, instead of merely age. We

[[Page 5622]]

believe that date of birth may be useful to covered entities because 
they are more likely to maintain a record of an individual's date of 
birth, rather than his or her static age. We also note that the 2000 
preamble identifies insurance status as falling within the category of 
demographic information. The final rule continues to allow covered 
entities to use or disclose information about an individual's health 
insurance status for fundraising purposes; however, we list this 
category of information separately in the regulatory text, as we do not 
believe this information truly constitutes demographic information.
    In addition to demographic information, health insurance status, 
and dates of health care provided to the individual (which is currently 
permitted under the Rule), this final rule also allows covered entities 
to use and disclose department of service information, treating 
physician information, and outcome information for fundraising 
purposes. These three categories of information were most frequently 
identified by commenters as the most needed for covered entities to 
further target fundraising communications to appropriate individuals. 
Although we do not define these terms, we clarify that department of 
service information includes information about the general department 
of treatment, such as cardiology, oncology, or pediatrics. 
Additionally, we clarify that outcome information includes information 
regarding the death of the patient or any sub-optimal result of 
treatment or services. In permitting its use for fundraising purposes, 
we intend for it to be used by the covered entity itself to screen and 
eliminate from fundraising solicitations those individuals experiencing 
a sub-optimum outcome, and for its disclosure to a business associate 
or institutionally related foundation only where such screening 
function is done by those parties. We also emphasize that as with any 
use or disclosure under the Privacy Rule, a covered entity must apply 
the minimum necessary standard at Sec.  164.502(b) to ensure that only 
the minimum amount of protected health information necessary to 
accomplish the intended purpose is used or disclosed.
    We adopt in the final rule the provision prohibiting the 
conditioning of treatment or payment on an individual's choice with 
respect to the receipt of fundraising communications. We also adopt at 
Sec.  164.520(b)(1)(iii)(A) the requirement that the notice of privacy 
practices inform individuals that a covered entity may contact them to 
raise funds for the covered entity and an individual has a right to opt 
out of receiving such communications. The final rule does not require 
covered entities to send pre-solicitation opt outs to individuals prior 
to the first fundraising communication. We believe that because the 
individual will be on notice of the opportunity to opt out of receiving 
fundraising communications through the notice of privacy practices and 
the first fundraising communication itself will contain a clear and 
conspicuous opportunity to opt out, there is no need to require covered 
entities to incur the additional burden and cost of sending pre-
solicitation opt outs.
    Under the Privacy Rule fundraising communications can take many 
forms, including communications made over the phone. Despite the fact 
that the HITECH Act refers only to written fundraising communications, 
because the Privacy Rule applies to communications made over the phone, 
we believe it would be counterintuitive to apply the strengthened opt 
out requirement to only written fundraising communications. Therefore, 
like fundraising communications made in writing, covered entities that 
make fundraising communications over the phone must clearly inform 
individuals that they have a right to opt out of further solicitations. 
Accordingly, to make clear that the opt out requirement applies to 
fundraising solicitations made over the phone, the final rule provides 
that the opt out requirement applies to each fundraising communication 
``made'' rather than ``sent'' to an individual.
    We also emphasize that the notice and opt out requirements for 
fundraising communications apply only where the covered entity is using 
or disclosing protected health information to target the fundraising 
communication. If the covered entity does not use protected health 
information to send fundraising materials, then the notice and opt out 
requirements do not apply. For example, if a covered entity uses a 
public directory to mail fundraising communications to all residents in 
a particular geographic service area, the notice and opt out 
requirements are not applicable.
Response to Other Public Comments
    Comment: A few commenters suggested that, to better protect an 
individual's privacy, particularly where sensitive health information 
may be used to target solicitations, the final rule should require an 
opt in process rather than an opt out process for consenting to 
fundraising communications.
    Response: We decline to require an opt in process. The HITECH Act 
did not replace the right to opt out of fundraising communications with 
an opt in process. Further, we continue to believe that the opt out 
process, particularly as it has been strengthened by the HITECH Act and 
this final rule, provides individuals with appropriate control over the 
use of their information for these purposes.
    Comment: One commenter asked that if an individual opts out of 
receiving further fundraising communications through a mailed 
communication, must the covered entity also remove the individual's 
name from the list through which the covered entity sends email 
fundraising communications, or must the individual opt out of receiving 
such email communications separately.
    Response: A covered entity may choose to provide individuals with 
the opportunity to select their preferred method for receiving 
fundraising communications. If an individual elects to opt out of 
future fundraising communications, then the opt out is effective for 
all forms of fundraising communications. Thus, the individual must be 
removed from all such lists.
8. Section 164.520--Notice of Privacy Practices for Protected Health 
Information
Proposed Rule
    Section 164.520 of the Privacy Rule sets out the requirements for 
most covered entities to have and distribute a notice of privacy 
practices (NPP). The NPP must describe the uses and disclosures of 
protected health information a covered entity is permitted to make, the 
covered entity's legal duties and privacy practices with respect to 
protected health information, and the individual's rights concerning 
protected health information.
    Section 164.520(b)(1)(ii) requires a covered entity to include 
separate statements about permitted uses and disclosures that the 
covered entity intends to make, including uses and disclosures for 
certain treatment, payment, or health care operations purposes. 
Further, Sec.  164.520(b)(1)(ii)(E) currently requires that the NPP 
contain a statement that any uses and disclosures other than those 
permitted by the Privacy Rule will be made only with the written 
authorization of the individual, and that the individual has the right 
to revoke an authorization pursuant to Sec.  164.508(b)(5).
    We proposed to amend Sec.  164.520(b)(1)(ii)(E) to require that the 
NPP describe the uses and disclosures of protected health information 
that

[[Page 5623]]

require an authorization under Sec.  164.508(a)(2) through (a)(4) 
(i.e., including a statement that most uses and disclosures of 
psychotherapy notes and of protected health information for marketing 
purposes and the sale of protected health information require an 
authorization), and provide that other uses and disclosures not 
described in the notice will be made only with the individual's 
authorization.
    Section 164.520(b)(1)(iii) requires a covered entity to include in 
its NPP separate statements about certain activities if the covered 
entity intends to engage in any of the activities. In particular, Sec.  
164.520(b)(1)(iii) requires a separate statement in the notice if the 
covered entity intends to contact the individual to provide appointment 
reminders or information about treatment alternatives or other health-
related benefits or services; to contact the individual to fundraise 
for the covered entity; or, with respect to a group health plan, to 
disclose protected health information to the plan sponsor.
    First, with respect to this provision, the NPRM proposed to modify 
Sec.  164.520(b)(1)(iii)(A) to align the required statement with the 
proposed modifications related to marketing and subsidized treatment 
communications. The provision would have required a covered health care 
provider that intends to send treatment communications to individuals 
and has received financial remuneration in exchange for making the 
communication to, in its NPP, notify individuals of this intention and 
to inform them that they can opt out of receiving such communications. 
Second, at Sec.  164.520(b)(1)(iii)(B) we proposed to require that if a 
covered entity intends to contact the individual to raise funds for the 
entity as permitted under Sec.  164.514(f)(1), the covered entity must 
not only inform the individual in the NPP of this intention but also 
must inform the individual that he or she has the right to opt out of 
receiving such communications.
    Section 164.520(b)(1)(iv) requires that the NPP contain statements 
regarding the rights of individuals with respect to their protected 
health information and a brief description of how individuals may 
exercise such rights. Section 164.520(b)(1)(iv)(A) currently requires a 
statement and a brief description addressing an individual's right to 
request restrictions on the uses and disclosures of protected health 
information pursuant to Sec.  164.522(a), including the fact that the 
covered entity is not required to agree to this request.
    The NPRM proposed to modify Sec.  164.520(b)(1)(iv)(A) to require a 
statement explaining that the covered entity is required to agree to a 
request to restrict disclosure of protected health information to a 
health plan if the disclosure is for payment or health care operations 
and pertains to a health care item or service for which the individual 
has paid out of pocket in full, as provided at Sec.  164.522(a)(1)(vi).
    Under Subpart D of Part 164, covered entities now have new breach 
notification obligations. We requested comment on whether the Privacy 
Rule should require a specific statement regarding this new legal duty 
and what particular aspects of this new duty would be important for 
individuals to be notified of in the NPP.
    The NPRM stated that modifications to Sec.  164.520 would represent 
material changes to covered entities' NPPs. Section 164.520(b)(3) 
requires that when there is a material change to the NPP, covered 
entities must promptly revise and distribute the NPP as outlined at 
Sec.  164.520(c). Section 164.520(c)(1)(i)(C) requires that health 
plans provide notice to individuals covered by the plan within 60 days 
of any material revision to the NPP. Because we acknowledged that 
revising and redistributing a NPP may be costly for health plans, we 
requested comment on ways to inform individuals of this change to 
privacy practices without unduly burdening health plans. We requested 
comment on options for informing individuals in a timely manner of this 
proposed or other material changes to the NPP. We also requested 
comment on this issue in the proposed changes to the Privacy Rule 
pursuant to the Genetic Information Nondiscrimination Act (GINA), as 
discussed below in Section VI. In particular, the Department requested 
comment on the following options: (1) Replace the 60-day requirement 
with a requirement for health plans to revise their NPPs and 
redistribute them (or at least notify members of the material change to 
the NPP and how to obtain the revised NPP) in their next annual mailing 
to members after a material revision to the NPP, such as at the 
beginning of the plan year or during the open enrollment period; (2) 
provide a specified delay or extension of the 60-day timeframe for 
health plans (3) retain the provision generally to require health plans 
to provide notice within 60 days of a material revision but provide 
that the Secretary will waive the 60-day timeframe in cases where the 
timing or substance of modifications to the Privacy Rule call for such 
a waiver; or (4) make no change and thus, require that health plans 
that perform underwriting provide notice to individuals within 60 days 
of the material change to the NPP that would be required by this 
proposed rule. The Department requested comment on these options, as 
well as any other options for informing individuals in a timely manner 
of material changes to the NPP.
    Section 164.520(c)(2)(iv) requires that when a health care provider 
with a direct treatment relationship with an individual revises the 
NPP, the health care provider must make the NPP available upon request 
on or after the effective date of the revision and must comply with the 
requirements of Sec.  164.520(c)(2)(iii) to have the NPP available at 
the delivery site and to post the notice in a clear and prominent 
location. We did not propose changes to these provisions because we did 
not believe these requirements to be overly burdensome but we requested 
comment on the issue.
Overview of Public Comments
    We received several comments expressing support for the proposed 
requirement that the NPP include a statement about the uses and 
disclosures that require authorization. However, other commenters 
opposed this requirement, arguing that because not all uses and 
disclosures will apply to every individual, the statement will cause 
confusion and unnecessary concern. Additionally, these commenters 
argued that the cost of listing all of the situations requiring 
authorization would be significant.
    We received several comments in support of the proposed requirement 
that the NPP include a specific statement about authorization for uses 
and disclosures of psychotherapy notes. Some of these commenters 
requested that the final rule require covered providers to describe in 
their NPPs their recordkeeping practices with regard to psychotherapy 
notes and how those practices affect what information can be used and 
disclosed. Several commenters argued that only covered entities that 
record psychotherapy notes should be required to include a statement 
about the authorization requirement for psychotherapy notes in their 
NPPs.
    We also received several comments expressing concern regarding the 
proposed requirement to include information in the NPP about the 
individual's right to opt out of receiving certain communications. 
These commenters argued that information notifying individuals that 
they could opt out of receiving further subsidized treatment or 
fundraising communications would provide little

[[Page 5624]]

value to individuals at a significant cost to covered entities. These 
commenters felt that including this information would be unnecessary 
because all subsidized treatment and fundraising communications 
themselves will include an opt-out mechanism, and as such, including 
the information in the NPP may cause unnecessary concern for consumers.
    We received one comment in support of the requirement to include in 
the NPP a statement about an individual's right to restrict certain 
uses and disclosures of protected health information if the individual 
pays for treatment or services out-of-pocket in full. We also received 
one comment suggesting that only health care providers should be 
required to include such a statement in their NPP.
    We received a number of comments supporting a requirement to 
include a statement in the NPP about the right to be notified following 
a breach of unsecured protected health information. One commenter 
suggested that explaining breach notification requirements in the NPP 
would help entities handle customer service issues that arise when 
customers become upset upon receipt of such a breach notification. 
However, a number of other commenters expressed opposition to this 
proposal due to concern that such a statement would cause unnecessary 
concern and fear among individuals who may believe that covered 
entities cannot appropriately secure their protected health 
information. Finally, we received one comment requesting that HHS 
specify the required elements of a breach notification statement for a 
NPP.
    We also received several comments arguing that the proposed changes 
should not constitute material changes to privacy practices requiring a 
new NPP, particularly where covered entities have already revised their 
NPPs to comply with the HITECH Act or State law requirements. Two 
additional commenters argued that each covered entity should determine 
whether a change is material or not, depending on its existing privacy 
practices.
    We received a number of comments regarding the appropriate timing 
and manner for distributing new NPPs. The majority of the comments 
received generally fell into three categories: (1) Support for a 
requirement to revise and distribute notices within 60 days of a 
material change; (2) a recommendation for HHS to require that covered 
entities promptly post a revised NPP on their Web site in conjunction 
with a requirement to send a notice of the change by mail within a 
specified period; and (3) a request for HHS to extend the compliance 
deadline and permit the distribution of the revised NPP through a 
quarterly newsletter, annual mailing, after 18 months of transition, or 
in a triennial mailing. In addition, many commenters supported 
electronic distribution of an NPP or a notice of material changes to 
the NPP.
    While not proposed, some commenters suggested eliminating or 
alternatives to the current requirements for health care providers with 
direct treatment relationships to hand the NPP to every individual 
patient and make a good faith attempt to obtain acknowledgement of 
receipt.
    A few commenters also expressed concern regarding the cost burden 
associated with revising and distributing a new NPP. One commenter 
argued that considerations of cost do not justify a delay in 
distributing a revised NPP.
Final Rule
    First, the final rule adopts the modification to Sec.  
164.520(b)(1)(ii)(E), which requires certain statements in the NPP 
regarding uses and disclosures that require authorization. We note 
that, contrary to some commenter concerns, the final rule does not 
require the NPP to include a list of all situations requiring 
authorization. Instead, the NPP must contain a statement indicating 
that most uses and disclosures of psychotherapy notes (where 
appropriate), uses and disclosures of protected health information for 
marketing purposes, and disclosures that constitute a sale of protected 
health information require authorization, as well as a statement that 
other uses and disclosures not described in the NPP will be made only 
with authorization from the individual.
    The final rule does not require the NPP to include a description of 
a covered entity's recordkeeping practices with respect to 
psychotherapy notes; however, covered entities are free to include such 
additional information in their NPP if they choose. Additionally, in 
response to requests by some commenters, we clarify that covered 
entities that do not record or maintain psychotherapy notes are not 
required to include a statement in their NPPs about the authorization 
requirement for uses and disclosures of psychotherapy notes.
    Second, because the final rule treats all subsidized treatment 
communications as marketing communications, we have not adopted the 
proposal to require a statement in the NPP about such communications 
and the ability of an individual to opt out. For further discussion on 
the decision to treat all subsidized treatment communications as 
marketing communications requiring an authorization, please see the 
above discussion regarding Sec.  164.501.
    The final rule, however, adopts the proposed requirement for a 
statement in the NPP regarding fundraising communications and an 
individual's right to opt out of receiving such communications, if a 
covered entity intends to contact an individual to raise funds for the 
covered entity. Because individuals will be provided the opportunity to 
opt out of fundraising communications with each solicitation, the final 
rule does not require the NPP to include the mechanism for individuals 
to opt out of receiving fundraising communications, although covered 
entities are free to include such information if they choose to do so.
    The final rule also adopts the proposal that the NPP inform 
individuals of their new right to restrict certain disclosures of 
protected health information to a health plan where the individual pays 
out of pocket in full for the health care item or service. Only health 
care providers are required to include such a statement in the NPP; 
other covered entities may retain the existing language indicating that 
a covered entity is not required to agree to a requested restriction.
    The final rule also requires covered entities to include in their 
NPP a statement of the right of affected individuals to be notified 
following a breach of unsecured protected health information. We 
believe that individuals should be informed of their right to receive 
and the obligations of covered entities to provide notification 
following a breach. We disagree with the commenters who argued that 
such a statement would cause individuals unnecessary concern and would 
create unfounded fear that covered entities cannot appropriately secure 
protected health information. Such advance notice of their rights 
should provide helpful context for individuals should they later 
receive a breach notification. In response to comments, we also clarify 
that a simple statement in the NPP that an individual has a right to or 
will receive notifications of breaches of his or her unsecured 
protected health information will suffice for purposes of this 
requirement. We do not intend for this requirement to add undue 
complexity or length to a covered entity's NPP. Thus, the statement 
need not be entity-specific, such as by describing how the covered 
entity will conduct a risk assessment, include the regulatory 
descriptions of ``breach'' or ``unsecured PHI,'' or describe the types

[[Page 5625]]

of information to be provided in the actual breach notification to the 
individual. However, covered entities that wish to include additional 
or more detailed information may do so.
    These changes represent material changes to the NPP of covered 
entities. We disagree with the few commenters who argued that such 
modifications to Sec.  164.520 do not constitute material changes of 
privacy practices requiring the distribution of new NPPs. The 
modifications to Sec.  164.520 are significant and are important to 
ensure that individuals are aware of the HITECH Act changes that affect 
privacy protections and individual rights regarding protected health 
information.
    Section 164.520(c)(1) of the final rule requires a health plan that 
currently posts its NPP on its Web site in accordance with Sec.  
164.520(c)(3)(i) to: (1) Prominently post the material change or its 
revised notice on its web site by the effective date of the material 
change to the notice (e.g., the compliance date of this final rule) and 
(2) provide the revised notice, or information about the material 
change and how to obtain the revised notice, in its next annual mailing 
to individuals then covered by the plan, such as at the beginning of 
the plan year or during the open enrollment period. Health plans that 
do not have customer service web sites are required to provide the 
revised NPP, or information about the material change and how to obtain 
the revised notice, to individuals covered by the plan within 60 days 
of the material revision to the notice. These requirements apply to all 
material changes including, where applicable, the rule change adopted 
pursuant to GINA to prohibit most health plans from using or disclosing 
genetic information for underwriting purposes.
    We believe these distribution requirements best balance the right 
of individuals to be informed of their privacy rights with the burden 
on health plans to provide the revised NPP. We also note that health 
plans should provide both paper- and web-based notices in a way 
accessible to all beneficiaries, including those individuals with 
disabilities. These modifications provide an avenue for an individual 
to be informed of material changes upon their effective date while 
better aligning the NPP distribution with health plans' normal mailings 
to individuals.
    For health care providers, the final rule does not modify the 
current requirements to distribute revisions to the NPP. As such, Sec.  
164.520(c)(2)(iv) requires that when a health care provider with a 
direct treatment relationship with an individual revises the NPP, the 
health care provider must make the NPP available upon request on or 
after the effective date of the revision and must comply with the 
requirements of Sec.  164.520(c)(2)(iii) to have the NPP available at 
the delivery site and to post the notice in a clear and prominent 
location. In response to several comments expressing concern about 
printing costs for new NPPs, we clarify that providers are not required 
to print and hand out a revised NPP to all individuals seeking 
treatment; providers must post the revised NPP in a clear and prominent 
location and have copies of the NPP at the delivery site for 
individuals to request to take with them. Providers are only required 
to give a copy of the NPP to, and obtain a good faith acknowledgment of 
receipt from, new patients. As a result, we do not believe that the 
current requirement is overly burdensome to providers, nor is it overly 
costly. We also clarify that while health care providers are required 
to post the NPP in a clear and prominent location at the delivery site, 
providers may post a summary of the notice in such a location as long 
as the full notice is immediately available (such as on a table 
directly under the posted summary) for individuals to pick up without 
any additional burden on their part. It would not be appropriate, 
however, to require the individual to have to ask the receptionist for 
a copy of the full NPP.
    To the extent that some covered entities have already revised their 
NPPs in response to the enactment of the HITECH Act or State law 
requirements, we clarify that as long as a covered entity's current NPP 
is consistent with this final rule and individuals have been informed 
of all material revisions made to the NPP, the covered entity is not 
required to revise and distribute another NPP upon publication of this 
final rule. Finally, we note that to the extent a covered entity is 
required to comply with Section 504 of the Rehabilitation Act of 1973 
or the Americans with Disabilities Act of 1990, the covered entity has 
an obligation to take steps that may be necessary to ensure effective 
communication with individuals with disabilities, which could include 
making the revised NPP or notice of material changes to the NPP 
available in alternate formats, such as Braille, large print, or audio.
Response to Other Public Comments
    Comment: One commenter expressed concern about the addition of more 
information to the NPP when it is already very long and complex, while 
several commenters recommended that the final rule require NPPs to be 
shortened, simplified, and written in a clear, easily understandable 
manner. In addition, while a few commenters suggested that HHS provide 
a sample or standard NPP, many more commenters requested flexibility in 
developing the content of their respective NPPs.
    Response: We believe that the additions to the NPP required by the 
final rule are necessary to fully inform individuals of the covered 
entity's privacy practices and their rights. The NPP should be provided 
in a clear, concise, and easy to understand manner, and we clarify that 
covered entities may use a ``layered notice'' to implement the Rule's 
provisions, so long as the elements required at Sec.  164.520(b) are 
included in the document that is provided for the individual. For 
example, a covered entity may satisfy the NPP provisions by providing 
the individual with both a short notice that briefly summarizes the 
individual's rights, as well as other information, and a longer notice, 
layered beneath the short notice that contains all the elements 
required by the Rule. Additionally, the Privacy Rule requires that the 
NPP be written in plain language, and we note that some covered 
entities may have obligations under other laws with respect to their 
communication with affected individuals. For example, to the extent a 
covered entity is obligated to comply with Title VI of the Civil Rights 
Act of 1964, the covered entity must take reasonable steps to ensure 
meaningful access for Limited English Proficient persons to the 
services of the covered entity, which could include translating the NPP 
into frequently encountered languages. In addition, we agree with the 
commenters who suggested that covered entities have flexibility and 
discretion to determine how to draft and prepare their NPPs. Because 
each NPP will vary based on the functions of the individual covered 
entity, there is no ``one size fits all'' approach. However, we 
continue to explore options for making model or best practice language 
available.
    Comment: One commenter requested elimination of the requirement 
that covered entities obtain agreement from individuals (an opt in) 
before electronic distribution while another commenter requested that 
HHS clarify that a covered entity may obtain an electronic agreement 
from an individual to receive an NPP electronically.
    Response: The Privacy Rule permits covered entities to distribute 
their NPPs or notices of material changes by email, provided the 
individual has agreed to receive an electronic copy. Although

[[Page 5626]]

internet access is a convenience of daily life for many individuals, 
maintaining the opt-in requirement ensures that individuals who are not 
able to or choose not to receive information electronically are fully 
informed of how their protected health information is being used and 
disclosed and of their individual rights with respect to this 
information. We clarify that agreement to receive electronic notice can 
be obtained electronically pursuant to the requirements at Sec.  
164.520(c)(3).
9. Section 164.522(a)--Right To Request a Restriction of Uses and 
Disclosures
    Section 164.522(a) of the Privacy Rule requires covered entities to 
permit individuals to request that a covered entity restrict uses or 
disclosures of their protected health information for treatment, 
payment, and health care operations purposes, as well as for 
disclosures to family members and certain others permitted under Sec.  
164.510(b). While covered entities are not required to agree to such 
requests for restrictions, if a covered entity does agree to restrict 
the use or disclosure of an individual's protected health information, 
the covered entity must abide by that restriction, except in emergency 
circumstances when the information is required for the treatment of the 
individual. Section 164.522 also includes provisions for the 
termination of such a restriction and requires that covered entities 
that have agreed to a restriction document the restriction in writing.
Proposed Rule
    Section 13405(a) of the HITECH Act sets forth certain circumstances 
in which a covered entity now must comply with an individual's request 
for restriction of disclosure of his or her protected health 
information. Specifically, section 13405(a) of the HITECH Act requires 
that when an individual requests a restriction on disclosure pursuant 
to Sec.  164.522, the covered entity must agree to the requested 
restriction unless the disclosure is otherwise required by law, if the 
request for restriction is on disclosures of protected health 
information to a health plan for the purpose of carrying out payment or 
health care operations and if the restriction applies to protected 
health information that pertains solely to a health care item or 
service for which the health care provider has been paid out of pocket 
in full.
    To implement section 13405(a) of the HITECH Act, we proposed a 
number of changes to the Privacy Rule's provisions regarding an 
individual's right to request restrictions of certain uses and 
disclosures. First, we proposed at Sec.  164.522(a)(1)(vi) to require a 
covered entity to agree to a request by an individual to restrict the 
disclosure of protected health information about the individual to a 
health plan if: (A) the disclosure is for the purposes of carrying out 
payment or health care operations and is not otherwise required by law; 
and (B) the protected health information pertains solely to a health 
care item or service for which the individual, or person on behalf of 
the individual other than the health plan, has paid the covered entity 
in full. In recognition that there are many situations in which family 
members or other persons may pay for the individual's treatment, we 
proposed to include language to the provision to ensure that this 
requirement not be limited to solely the individual paying for the 
health care item or service but would also include payment made by 
another person, other than the health plan, on behalf of the 
individual.
    We proposed to modify Sec.  164.522(a)(1)(ii), which states that a 
covered entity is not required to agree to a restriction, to refer to 
this exception to that general rule. We noted in the NPRM that in cases 
where an individual has exercised his or her right to restrict 
disclosure to a health plan under the above circumstances, the covered 
entity is also prohibited from making such disclosures to a business 
associate of the health plan, because a covered entity may only 
disclose protected health information to a business associate of 
another covered entity if the disclosure would be permitted directly to 
the other covered entity. We also proposed conforming modifications to 
Sec.  164.522(a)(2) and (3) regarding terminating restrictions and 
documentation of restrictions to reflect these new requirements, and to 
make clear that, unlike other agreed to restrictions, a covered entity 
may not unilaterally terminate a required restriction to a health plan 
under Sec.  164.522(a)(1)(ii).
    We provided a number of clarifications, and solicited public 
comment on a number of issues, regarding these proposed provisions, as 
follows. We stated that we interpret section 13405(a) as giving the 
individual a right to determine for which health care items or services 
the individual wishes to pay out of pocket and restrict. Thus, section 
13405(a) would not permit a covered entity to require individuals who 
wish to restrict disclosures about only certain health care items or 
services to a health plan to restrict disclosures of protected health 
information regarding all health care to the health plan. We requested 
comment on the types of treatment interactions between individuals and 
covered entities that would make implementing a restriction more 
difficult and ways to address such difficult situations, such as where 
an individual wishes to restrict a disclosure regarding a prescription 
to a health plan but because the provider electronically sends 
prescriptions to the pharmacy to be filled, the pharmacy may have 
already billed the health plan by the time the patient arrives at the 
pharmacy. We requested comment generally on whether covered health care 
providers that know of a restriction should inform other health care 
providers downstream of such restriction, including pharmacies, and 
whether technology could facilitate such notification. We requested 
comment on examples of the types of disclosures that may fall under 
this ``required by law'' exception. With respect to an individual, or 
someone on behalf of the individual, paying out of pocket for the 
health care item or service, we noted that the individual should not 
expect that this payment would count towards the individual's out of 
pocket threshold with respect to his or her health plan benefits. We 
requested comment on how this provision will function with respect to 
HMOs, given our understanding that under most current HMO contracts 
with providers an individual could not pay the provider in full for the 
treatment or service received. We clarified in the NPRM that if an 
individual's out of pocket payment for a health care item or service is 
not honored (e.g., the individual's check bounces), the covered entity 
is not obligated to continue to abide by the requested restriction 
because the individual has not fulfilled the requirements necessary to 
obtain the restriction. Additionally, we stated our expectation in such 
cases that covered entities make some attempt to resolve any payment 
issues with the individual prior to sending the protected health 
information to the health plan, such as by notifying the individual 
that his or her payment did not go through and giving the individual an 
opportunity to submit payment and requesting comment on the extent to 
which covered entities must make reasonable efforts to secure payment 
from the individual prior to billing the health plan. We requested 
comment on the scope of a restriction and in what circumstances it 
should apply to a subsequent, but related, treatment

[[Page 5627]]

encounter, such as follow-up care for treatment of a particular 
condition.
Overview of Public Comments
    We received many comments on these proposed provisions and our 
questions as to how they should apply. A number of commenters generally 
supported the provisions as being an important right for health care 
consumers. However, many commenters expressed concerns with these new 
requirements. Many commenters raised concerns with, and requested 
guidance on, how to operationalize a restriction. Several commenters 
were concerned with having to create separate records to ensure that 
restricted data is not inadvertently sent to or accessible by the 
health plan or to manually redact information from the medical record 
prior to disclosure to a health plan. Commenters argued that having to 
segregate restricted and unrestricted information or redact restricted 
information prior to disclosure would be burdensome as such a process 
would generally have to occur manually, and may result in difficulties 
with ensuring that treating providers continue to have access to the 
entire medical record. Some commenters were concerned specifically with 
having to manually redact or create separate records prior to a health 
plan audit, or otherwise with withholding information from a plan 
during an audit, to ensure a health plan would not see restricted 
information.
    With respect to the exception to a restriction for disclosures that 
are required by law, several commenters supported this exception but 
requested clarification on how such an exception would affect 
providers' existing legal obligations. Many commenters suggested that 
providers would be prohibited from receiving cash payment from 
individuals for items or services otherwise covered by State or 
Federally funded programs, such as Medicare and Medicaid, and thus, 
requested that disclosures to such State or Federally funded programs 
not be eligible for restriction. Similarly, some commenters sought 
clarification on the effect of this provision where certain State laws 
prohibit ``balance billing,'' making it illegal for the provider to 
bill the patient for any covered services over and above any 
permissible copayment, coinsurance or deductible amounts. Some 
commenters asked that we clarify that the ``required by law'' exception 
allows providers to disclose protected health information subject to a 
restriction for Medicare and Medicaid audits, because those insurers 
require complete, accurate records for audits.
    Other commenters were concerned with applying a restriction to only 
certain health care items or services provided during a single patient 
encounter or visit. Commenters argued that split billing is not 
possible for most providers or that it may be obvious to a health plan 
if one item or service out of a bundle is restricted and that 
unbundling services may be costly. One commenter suggested that 
individuals should only be able to restrict certain types of services/
treatment (e.g., cosmetic surgery and family planning services) as such 
services are more easily segregable from other health care services.
    In response to our question regarding available electronic methods 
through which a prescribing provider could alert a pharmacy that an 
individual intends to pay out of pocket for a prescription and restrict 
disclosure to a health plan, commenters indicated they were generally 
unaware of any system that would alert a pharmacy of restrictions 
electronically, and many agreed that the cost and burden of flagging 
records manually would not be feasible for all covered entities. In 
general, commenters agreed that paper prescriptions would provide 
individuals with an opportunity to request a restriction when they 
arrive at the pharmacy. However, commenters also noted that returning 
to the use of paper prescriptions over electronic prescribing would be 
a step in the wrong direction, as there are many benefits to electronic 
prescribing, and it is important not to limit these benefits.
    Almost all of the comments we received regarding the obligation 
generally of health care providers that know of a restriction to inform 
downstream health care providers of the restriction argued that it 
should be the individual's and not the provider's responsibility to 
inform downstream providers of any requested restriction. While a few 
commenters stated that the provider should bear this responsibility, 
the majority believed that this obligation would be difficult and 
burdensome for a provider. Some commenters acknowledged that in time, 
more advanced electronic and automated systems may allow providers to 
notify other providers downstream of a restriction, but these 
commenters stressed that such systems are not widely available at this 
time.
    With respect to the requirement's application to health care 
providers providing care within an HMO context, many commenters 
expressed support for the suggestion that HMO patients would have to 
use an out-of-network provider for treatment to ensure that the 
restricted information would not be disclosed to the HMO. Some 
commenters indicated that State laws and/or provider contracts with an 
HMO may prohibit the provider from receiving a cash payment from an HMO 
patient above the patient's cost-sharing amount for the health care 
item or service. Conversely, some commenters stated that individuals 
should not have to go out-of-network when requesting a restriction and 
instead, providers could and should treat the services as non-covered 
services and accept payment directly from the patient. Several 
commenters also suggested that managed care contracts would have to be 
revised or renegotiated in order to comply with this provision and as 
such, ample time for renegotiation should be provided.
    Commenters generally supported the language in the proposed rule 
making clear that a restriction would apply where an individual 
requests a restriction, but someone other than the individual (other 
than the health plan), such as a family member, pays for the 
individual's care on behalf of the individual. One commenter asked for 
clarification that payment by any health plan would not constitute 
payment out of pocket by the individual. The commenter stated that such 
clarification was necessary to avoid the situation where an individual 
has coverage under multiple plans, pays for care with a secondary plan, 
requests a restriction on disclosure to the primary plan, and then the 
secondary plan proceeds to obtain reimbursement from the primary plan 
disclosing the protected health information at issue. Another commenter 
asked that we clarify that a clinical research participant whose health 
care services are paid for by a research grant can still qualify for a 
restriction to the individual's health plan.
    Most commenters supported not having to abide by a requested 
restriction in cases where the individual's method of payment is 
returned or otherwise does not go through. A few commenters suggested 
that a covered entity should include information to this effect in its 
notice of privacy practices. A number of commenters expressed concern 
with the ability of a provider to bill a health plan for services 
following an individual's inability to pay. For example, a provider may 
find it difficult to be reimbursed for services if the provider did not 
obtain the plan's required pre-certification for services because the 
individual initially agreed to pay out of pocket for the services.
    Several commenters asked for guidance on what constitutes a

[[Page 5628]]

``reasonable effort'' to obtain payment from an individual prior to 
billing a health plan for health care services where an individual's 
original form of payment fails, and argued that the effort required 
should not be too burdensome on providers. A number of commenters 
suggested various alternatives. A few commenters suggested that 
providers should be able to set a deadline for payment and then bill 
the plan if the patient fails to pay; others requested that the 
regulation set a specific timeframe in which providers must be paid or 
the requested restriction is terminated. Some commenters suggested that 
a ``reasonable effort'' should be based upon a covered entity making 
one or two attempts to contact the patient and obtain payment. Another 
commenter recommended that reasonable efforts should require the 
provider to make a good faith effort to obtain payment based on their 
usual debt collection practices. Other commenters requested 
clarification that reasonable efforts would not require a provider 
sending a bill to a collection agency. Some commenters were generally 
concerned with requiring a provider to wait too long for payment, as 
the provider could risk the plan not paying for the treatment if it is 
billed too late. Certain commenters argued that providers should not 
have to engage in any attempts to resolve payment issues if an 
individual's payment fails prior to billing the health plan for the 
services. Finally, a number of commenters asked whether a provider 
could require payment in full at the time of the request for a 
restriction to avoid payment issues altogether.
    Finally, many commenters responded to the NPRM's approach to 
follow-up care. The majority of commenters supported the idea that if 
an individual does not request a restriction and pay out of pocket for 
follow up care, then the covered entity may disclose the protected 
health information necessary to obtain payment from the health plan for 
such follow up care, recognizing that some of the protected health 
information may relate to and/or indicate that the individual received 
the underlying health care item or service to which a restriction 
applied. A few commenters asked whether individual authorization would 
be required to disclose previously restricted protected health 
information to a health plan if the individual does not want to 
restrict the follow up care. A number of commenters expressed support 
for providers counseling patients on the consequences of not 
restricting follow-up care. A few commenters were concerned as to how a 
provider would know when such counseling was needed and what it should 
include, and asked whether giving the individual a written statement 
explaining the consequences would suffice.
Final Rule
    We adopt the modifications to Sec.  164.522 as proposed in the NPRM 
to implement section 13405(a) of the HITECH Act. In response to 
questions and comments regarding how to operationalize these 
requirements, we provide the following clarifications. We clarify that 
these provisions do not require that covered health care providers 
create separate medical records or otherwise segregate protected health 
information subject to a restricted health care item or service. 
Covered health care providers will, however, need to employ some method 
to flag or make a notation in the record with respect to the protected 
health information that has been restricted to ensure that such 
information is not inadvertently sent to or made accessible to the 
health plan for payment or health care operations purposes, such as 
audits by the health plan. Covered entities should already have in 
place, and thus be familiar with applying, minimum necessary policies 
and procedures, which require limiting the protected health information 
disclosed to a health plan to the amount reasonably necessary to 
achieve the purpose of the disclosure. Thus, covered entities should 
already have mechanisms in place to appropriately limit the protected 
health information that is disclosed to a health plan.
    With respect to commenters who were concerned about providers being 
able to continue to meet their legal obligations, such as disclosing 
protected health information to Medicare or Medicaid for required 
audits, we note that the statute and final rule continue to allow 
disclosures that are otherwise required by law, notwithstanding that an 
individual has requested a restriction on such disclosures. Thus, a 
covered entity may disclose the protected health information necessary 
to meet the requirements of the law. Under the Privacy Rule, ``required 
by law'' is defined at Sec.  164.103 as a mandate contained in law that 
compels a covered entity to make a use or disclosure of protected 
health information and that is enforceable in a court of law. For 
purposes of this definition, ``required by law'' includes Medicare 
conditions of participation with respect to health care providers 
participating in the program, and statutes and regulations that require 
the production of information if payment is sought under a government 
program providing public benefits. Therefore, if a covered entity is 
required by law to submit protected health information to a Federal 
health plan, it may continue to do so as necessary to comply with that 
legal mandate. With respect to commenters' concerns with prohibitions 
in State law and under Medicare and Medicaid that prevent providers 
from billing, and receiving cash payment from, an individual for 
covered services over and above any permissible cost sharing amounts, 
we provide the following guidance. If a provider is required by State 
or other law to submit a claim to a health plan for a covered service 
provided to the individual, and there is no exception or procedure for 
individuals wishing to pay out of pocket for the service, then the 
disclosure is required by law and is an exception to an individual's 
right to request a restriction to the health plan pursuant to Sec.  
154.522(a)(1)(vi)(A) of the Rule. With respect to Medicare, it is our 
understanding that when a physician or supplier furnishes a service 
that is covered by Medicare, then it is subject to the mandatory claim 
submission provisions of section 1848(g)(4) of the Social Security Act 
(the Act), which requires that if a physician or supplier charges or 
attempts to charge a beneficiary any remuneration for a service that is 
covered by Medicare, then the physician or supplier must submit a claim 
to Medicare. However, there is an exception to this rule where a 
beneficiary (or the beneficiary's legal representative) refuses, of 
his/her own free will, to authorize the submission of a bill to 
Medicare. In such cases, a Medicare provider is not required to submit 
a claim to Medicare for the covered service and may accept an out of 
pocket payment for the service from the beneficiary. The limits on what 
the provider may collect from the beneficiary continue to apply to 
charges for the covered service, notwithstanding the absence of a claim 
to Medicare. See the Medicare Benefit Policy Manual, Internet only 
Manual pub. 100-2, ch. 15, sect. 40, available at https://www.cms.gov/manuals/Downloads/bp102c15.pdf. Thus, if a Medicare beneficiary 
requests a restriction on the disclosure of protected health 
information to Medicare for a covered service and pays out of pocket 
for the service (i.e., refuses to authorize the submission of a bill to 
Medicare for the service), the provider must restrict the disclosure of 
protected health information regarding the service to Medicare in 
accordance with Sec.  164.522(a)(1)(vi).

[[Page 5629]]

    Certain commenters raised concerns with an individual requesting a 
restriction with respect to only one of several health care items or 
services provided in a single patient encounter, and a provider being 
prohibited from unbundling, or it being more costly to unbundle, the 
services for purposes of billing a health plan. In such cases, we 
expect providers to counsel patients on the ability of the provider to 
unbundle the items or services and the impact of doing so (e.g., the 
health plan still may be able to determine that the restricted item or 
service was performed based on the context). If a provider is able to 
unbundle the items or services and accommodate the individual's wishes 
after counseling the individual on the impact of unbundling, it should 
do so. If a provider is not able to unbundle a group of items or 
services, the provider should inform the individual and give the 
individual the opportunity to restrict and pay out of pocket for the 
entire bundle of items or services. Where a provider is not able to 
unbundle a group of bundled items or services, we view such group of 
bundled items or services as one item or service for the purpose of 
applying Sec.  164.522(a)(1)(v). However, we would expect a provider to 
accommodate an individual's request for a restriction for separable and 
unbundled health care items or services, even if part of the same 
treatment encounter, such as in the prior example with respect to the 
patient receiving both treatment for asthma and diabetes. Thus, we 
decline to provide as a general rule that an individual may only 
restrict either all or none of the health care items or services that 
are part of one treatment encounter.
    In response to the question we posed in the NPRM regarding methods 
through which a provider could electronically (such as through an e-
prescribing tool) notify a pharmacist of an individual's restriction 
request, the majority of commenters indicated that there currently is 
not a widely available method for electronically notifying a pharmacy 
that a patient has requested a restriction. Further, commenters 
generally argued that it would be costly, burdensome, and unworkable 
for a provider to attempt to notify all subsequent providers of an 
individual's restriction request, particularly given the lack of 
automated tools to make such notifications, and thus, it should remain 
the obligation of the individual to notify downstream providers if the 
individual wants to restrict protected health information to a health 
plan. We agree that it would be unworkable at this point, given the 
lack of automated technologies to support such a requirement, to 
require health care providers to notify downstream providers of the 
fact that an individual has requested a restriction to a health plan. 
However, we do encourage providers to counsel patients that they would 
need to request a restriction and pay out of pocket with other 
providers for the restriction to apply to the disclosures by such 
providers. In the case of an individual who wants to restrict 
disclosures to a health plan concerning a prescribed medication, the 
prescribing provider can provide the patient with a paper prescription 
to allow the individual an opportunity to request a restriction and pay 
for the prescription with the pharmacy before the pharmacy has 
submitted a bill to the health plan. However, while we do not require 
it, providers are permitted and encouraged to assist individuals as 
feasible in alerting downstream providers of the individual's desire to 
request a restriction and pay out of pocket for a particular health 
care item or service.
    For example, consider an individual who is meeting with her primary 
physician and requests a restriction on tests that are being 
administered to determine if she has a heart condition. If, after 
conducting the tests, the patient's primary physician refers the 
patient to a cardiologist, it is the patient's obligation to request a 
restriction from the subsequent provider, the cardiologist, if she 
wishes to pay out of pocket rather than have her health plan billed for 
the visit. Although the primary physician in this example would not be 
required to alert the cardiologist of the patient's potential desire to 
request a restriction, we encourage providers to do so if feasible or 
in the very least, to engage in a dialogue with the patient to ensure 
that he or she is aware that it is the patient's obligation to request 
restrictions from subsequent providers. In response to commenters who 
were confused about whether the individual or the provider would have 
the obligation of notifying subsequent providers when a Health 
Information Exchange is involved, we clarify that the responsibility to 
notify downstream providers of a restriction request in this situation 
also remains with the individual, and not the provider.
    With respect to HMOs, we clarify that a provider providing care in 
such a setting should abide by an individual's requested restriction 
unless doing so would be inconsistent with State or other law. Thus, if 
a provider within an HMO is prohibited by law from accepting payment 
from an individual above the individual's cost-sharing amount (i.e., 
the provider cannot accept an out of pocket payment from the individual 
for the service), then the provider may counsel the individual that he 
or she will have to use an out-of-network provider for the health care 
item or service in order to restrict the disclosure of protected health 
information to the HMO for the health care. Providers operating within 
an HMO context and who are able under law to treat the health care 
services to which the restriction would apply as out-of-network 
services should do so in order to abide by the requested restriction. 
We would not consider a contractual requirement to submit a claim or 
otherwise disclose protected health information to an HMO to exempt the 
provider from his or her obligations under this provision. Further, the 
final rule provides a 180-day compliance period beyond the effective 
date of these revisions to the Privacy Rule, during which provider 
contracts with HMOs can be updated as needed to be consistent with 
these new requirements.
    As proposed in the NPRM, under the final rule, a covered entity 
must apply a restriction not only where an individual pays in full for 
the healthcare item or service, but also where a family member or other 
person pays for the item or service on behalf of the individual. We 
decline to modify the regulation, as suggested by one commenter, to 
provide that payment from ``any'' health plan, rather than the one to 
which the disclosure is restricted, should not constitute payment on 
behalf of the individual. In response to the commenter's concern about 
difficulties in coordination of benefits for individuals with coverage 
under multiple plans, we note that this provision does not impede a 
health plan's ability to disclose protected health information as 
necessary to another health plan for coordination of benefits. Thus, 
health plans may continue to make such disclosures.
    Many commenters supported the discussion in the NPRM regarding not 
abiding by a restriction if an individual's payment is dishonored. In 
such cases, we continue to expect that providers will make a reasonable 
effort to contact the individual and obtain payment prior to billing a 
health plan. We do not prescribe the efforts a health care provider 
must make but leave that up to the provider's policies and individual 
circumstances. While we require the provider to make a reasonable 
effort to secure payment from the individual, this requirement is not 
intended to place an additional

[[Page 5630]]

burden on the provider but is instead intended to align with its 
current policies for contacting individuals to obtain an alternative 
form of payment to one that was dishonored. We do not require that the 
individual's debt be placed in collection before a provider is 
permitted to bill a health plan for the health care services. Further, 
a provider may choose to require payment in full at the time of the 
request for a restriction to avoid payment issues altogether. 
Similarly, where precertification is required for a health plan to pay 
for services, a provider may require the individual to settle payments 
for the care prior to providing the service and implementing a 
restriction to avoid the situation where the provider is unable to be 
reimbursed by either the individual or the health plan.
    We also recognize that a provider may not be able to implement a 
restriction where an individual waits until care has been initiated to 
make such a request, such as in the case of a hospital stay, in which 
case the individual's protected health information may have already 
been disclosed to the health plan.
    With respect to restrictions and follow-up care, we continue to 
maintain the approach discussed in the NPRM. If an individual has a 
restriction in place with respect to a health care service but does not 
pay out of pocket and request a restriction with regard to follow-up 
treatment, and the provider needs to include information that was 
previously restricted in the bill to the health plan in order to have 
the service deemed medically necessary or appropriate, then the 
provider is permitted to disclose such information so long as doing so 
is consistent with the provider's minimum necessary policies and 
procedures. We also clarify that such a disclosure would continue to be 
permitted for payment purposes and thus, would not require the 
individual's written authorization. However, as we did in the NPRM, we 
highly encourage covered entities to engage in open dialogue with 
individuals to ensure that they are aware that previously restricted 
protected health information may be disclosed to the health plan unless 
they request an additional restriction and pay out of pocket for the 
follow-up care.
Response to Other Public Comments
    Comment: Several commenters asked that the provision be limited to 
just providers and not to covered entities in general. Commenters also 
asked for clarification on whether the restriction prohibits providers 
from giving protected health information to health plans solely for 
payment or health care operations purposes in such cases or all 
entities that may receive protected health information for payment or 
health care operations.
    Response: We clarify that this provision, in effect, will apply 
only to covered health care providers. However, the provisions of Sec.  
164.522(a) apply to covered entities generally and thus, we decline to 
alter the regulatory text. In response to commenters' concerns 
regarding disclosure for payment or health care operations purposes to 
entities other than the health plan, we clarify that this provision 
does not affect disclosures to these other entities as permitted by the 
Privacy Rule.
    Comment: Commenters asked what the liability is for a provider who 
discloses restricted protected health information to a plan.
    Response: A provider who discloses restricted protected health 
information to the health plan is making a disclosure in violation of 
the Privacy Rule and the HITECH Act, which, as with other impermissible 
disclosures is subject to the imposition of possible criminal 
penalties, civil money penalties, or corrective action.
    Comment: Several commenters asked that we clarify that the 
``required by law'' exception allows providers to respond to subpoenas, 
court orders, and judicial proceedings.
    Response: The ``required by law'' exception in Sec.  
164.522(a)(1)(vi) does allow health care providers to respond to court 
orders and subpoenas issued by a court requiring disclosure of 
protected health information to a health plan. See the definition of 
``required by law'' at Sec.  164.103. Further, Sec.  164.522(a)(1)(vi) 
does not affect the disclosure of protected health information to 
entities that are not health plans and thus, disclosures to these other 
entities made as required by law, for judicial and administrative 
proceedings, or for law enforcement activities in accordance with 
Sec. Sec.  164.512(a), 164.512(e), and 164.512(f), respectively, 
continue to be permitted.
    Comment: Several commenters suggested that the final rule be 
written to ensure that there are no conflicts with the Fair Debt 
Collection Practices Act and similar State laws regarding the legal 
obligation to validate a debt that is disputed by a debtor. Commenters 
sought clarification on whether the provider can still disclose 
protected health information for the recovery of debts.
    Response: The final rule does not impact a provider's ability to 
disclose protected health information for payment purposes to a 
collection agency or otherwise for collection activities related to an 
individual's debt to the provider. Section 164.522(a) restricts 
disclosures to a health plan for payment purposes where the individual 
has paid out of pocket for the health care item or service that is the 
subject of the disclosure and requests such a restriction.
    Comment: Commenters asked that we clarify whether payment with a 
Flexible Spending Account (FSA) or Health Savings Account (HSA) is 
considered a payment by a person on behalf of the individual.
    Response: An individual may use an FSA or HSA to pay for the health 
care items or services that the individual wishes to have restricted 
from another plan; however, in doing so the individual may not restrict 
a disclosure to the FSA or HSA necessary to effectuate that payment.
    Comment: When a restriction is requested, the provider is also 
prohibited from making disclosures of the restricted protected health 
information to the business associate of the health plan. One commenter 
suggested that the final rule make it the priority of the business 
associate to inform the provider that they are acting as the business 
associate of the health plan to ensure provider compliance with the 
rule. Other comments misconstrued the preamble statements on this issue 
and commented that a provider should be allowed to provide restricted 
protected health information to its own business associates.
    Response: A provider that is prohibited from disclosing protected 
health information to a health plan may not disclose such information 
to the health plan's business associate. We do not include a 
requirement that the business associate inform the provider that they 
are acting as a business associate of the health plan as it is the 
provider's responsibility to know to whom and for what purposes it is 
making a disclosure. We also clarify that a provider is not prohibited 
from disclosing protected health information restricted from a health 
plan to its own business associates for the provider's own purposes.
    Comment: One commenter expressed concern about the number of 
workforce members who must know about the restriction and indicated 
that this may create a risk for potential error with regard to the 
information.
    Response: Covered entities must identify those workforce members or 
class of persons who need access to particular protected health 
information, and appropriately train their workforce members as 
necessary to comply with these new requirements.

[[Page 5631]]

10. Section 164.524--Access of Individuals to Protected Health 
Information
Proposed Rule
    Section 164.524 of the Privacy Rule currently establishes, with 
limited exceptions, an enforceable means by which individuals have a 
right to review or obtain copies of their protected health information 
to the extent such information is maintained in the designated record 
set(s) of a covered entity. An individual's right of access exists 
regardless of the format of the protected health information, and the 
standards and implementation specifications that address individuals' 
requests for access and timely action by the covered entity (i.e., 
provision of access, denial of access, and documentation) apply to an 
electronic environment in a similar manner as they do to a paper-based 
environment. See The HIPAA Privacy Rule's Right of Access and Health 
Information Technology (providing guidance with respect to how Sec.  
164.524 applies in an electronic environment and how health information 
technology can facilitate providing individuals with this important 
privacy right), available at: https://www.hhs.gov/ocr/privacy/hipaa/understanding/special/healthit/eaccess.pdf.
    Section 13405(e) of the HITECH Act strengthens the Privacy Rule's 
right of access with respect to covered entities that use or maintain 
an electronic health record (EHR) on an individual. Section 13405(e) 
provides that when a covered entity uses or maintains an EHR with 
respect to protected health information of an individual, the 
individual shall have a right to obtain from the covered entity a copy 
of such information in an electronic format and the individual may 
direct the covered entity to transmit such copy directly to the 
individual's designee, provided that any such choice is clear, 
conspicuous, and specific. Section 13405(e) also provides that any fee 
imposed by the covered entity for providing such an electronic copy 
shall not be greater than the entity's labor costs in responding to the 
request for the copy.
    Section 13405(e) applies by its terms only to protected health 
information in EHRs. However, incorporating these new provisions in 
such a limited manner in the Privacy Rule could result in a complex set 
of disparate requirements for access to protected health information in 
EHR systems versus other types of electronic records systems. As such, 
the Department proposed to use its authority under section 264(c) of 
HIPAA to prescribe the rights individuals should have with respect to 
their individually identifiable health information to strengthen the 
right of access as provided under section 13405(e) of the HITECH Act 
more uniformly to all protected health information maintained in one or 
more designated record sets electronically, regardless of whether the 
designated record set is an EHR. The public comments and final 
regulation on the scope are discussed here. The proposed amendments to 
each provision implicated by section 13405(e), together with the public 
comments and final regulation, are discussed more specifically in 
separate sections below.
Overview of Public Comments
    Most commenters were opposed to the proposal to expand the scope of 
the individual access provision to include all electronic designated 
record sets and favored limiting the requirement to EHRs. These 
commenters felt that limiting the access provision to EHRs was 
consistent with congressional intent and questioned the authority of 
the Department to expand the scope. Commenters also argued that having 
disparate requirements for different systems would not be confusing, 
and requiring electronic access to electronic designated record sets 
that are not EHRs would be highly burdensome for covered entities. 
Specifically, commenters stated that the proposed requirement for 
electronic access would include numerous types of legacy systems, many 
of which are incapable of producing reports in easily readable formats 
that can be transmitted electronically. These commenters indicated that 
a significant amount of information technology development and 
investment would be needed to comply with this requirement if it 
applies to all electronic designated record sets.
    A number of consumer advocates supported the expanded scope to 
include all electronic designated records sets in addition to EHRs. 
These commenters felt that this would provide complete transparency for 
consumers, help individuals gain access to their medical records and 
make better-informed decisions about their health care, and promote 
consistent and uniform practices.
Final Rule
    The final rule adopts the proposal to amend the Privacy Rule at 
Sec.  164.524(c)(2)(ii) to require that if an individual requests an 
electronic copy of protected health information that is maintained 
electronically in one or more designated record sets, the covered 
entity must provide the individual with access to the electronic 
information in the electronic form and format requested by the 
individual, if it is readily producible, or, if not, in a readable 
electronic form and format as agreed to by the covered entity and the 
individual. In such cases, to the extent possible, we expect covered 
entities to provide the individual with a machine readable copy of the 
individual's protected health information. The Department considers 
machine readable data to mean digital information stored in a standard 
format enabling the information to be processed and analyzed by 
computer. For example, this would include providing the individual with 
an electronic copy of the protected health information in the format of 
MS Word or Excel, text, HTML, or text-based PDF, among other formats.
    We disagree with commenters that questioned the Department's 
authority to extend the strengthened electronic access right to all 
protected health information maintained electronically in designated 
record sets, and believe that this extended electronic right of access 
is important for individuals as covered entities increasingly 
transition from paper to electronic records. With regard to the 
additional burdens on covered entities, we note that providing access 
to protected health information held in electronic designated record 
sets was already required under the Privacy Rule at Sec.  164.524, 
which applies to protected health information in both paper and 
electronic designated record sets, and which requires providing the 
copy in the form and format requested by the individual, including 
electronically, if it is readily producible in such form and format. We 
anticipate the additional burden to be small due to the flexibility 
permitted in satisfying this new requirement, as discussed in the 
section on Form and Format.
Response to Other Public Comments
    Comment: Some commenters worried that giving individuals access to 
administrative systems (in contrast to clinical systems) would present 
a security concern to covered entities.
    Response: Covered entities are not required by this provision to 
provide individuals with direct access to their systems. They must only 
provide individuals with an electronic copy of their protected health 
information.
    Comment: Commenters requested clarification on what constitutes an 
EHR.
    Response: Under this final rule, the requirement to provide 
individuals with access to an electronic copy includes all

[[Page 5632]]

protected health information maintained in an electronic designated 
record set held by a covered entity. Because we are not limiting the 
right of electronic access to EHRs, we do not believe there is a need 
to define or further clarify the term at this time.
    Comment: One commenter requested clarification that this electronic 
access requirement preempts State laws that diminish, block, or limit 
individual access to their records.
    Response: We clarify that this HIPAA electronic right of access 
requirement does preempt contrary State law unless such law is more 
stringent. In the case of right of access, more stringent means that 
such State law permits greater rights of access to the individual.
    Comment: Several commenters sought clarification of how the new e-
access provisions would apply to business associates. One commenter 
asked whether business associates could continue to provide patients 
access to records when permitted and acting on behalf of a covered 
entity. Another commenter asked whether business associates are 
required to provide information to covered entities and not to 
individuals directly. One commenter was opposed to direct access from a 
business associate because of security concerns and increased burden on 
business associates if corrections are needed.
    Response: How and to what extent a business associate is to support 
or fulfill a covered entity's obligation to provide individuals with 
electronic access to their records will be governed by the business 
associate agreement between the covered entity and the business 
associate. For example, the business associate agreement may provide 
for the business associate to give copies of the requested information 
directly to the individual, or to the covered entity for the covered 
entity to provide the copies to the individual. There is no separate 
requirement on business associates to provide individuals with direct 
access to their health records, if that is not what has been agreed to 
between the covered entity and the business associate in the business 
associate agreement.
a. Form and Format
Proposed Rule
    Section 164.524(c)(2) of the Privacy Rule currently requires a 
covered entity to provide the individual with access to the protected 
health information in the form or format requested by the individual, 
if it is readily producible in such form or format, or, if not, in a 
readable hard copy form or such other form or format as agreed to by 
the covered entity and the individual. Section 13405(e) of the HITECH 
Act expands this requirement by explicitly requiring a covered entity 
that uses or maintains an EHR with respect to protected health 
information to provide the individual with a copy of such information 
in an electronic format.
    We proposed to implement this statutory provision, in conjunction 
with our broader authority under section 264(c) of HIPAA, by requiring, 
in proposed Sec.  164.524(c)(2)(ii), that if the protected health 
information requested is maintained electronically in one or more 
designated record sets, the covered entity must provide the individual 
with access to the electronic information in the electronic form and 
format requested by the individual, if it is readily producible, or, if 
not, in a readable electronic form and format as agreed to by the 
covered entity and the individual. This provision would require any 
covered entity that electronically maintains the protected health 
information about an individual, in one or more designated record sets, 
to provide the individual with an electronic copy of such information 
(or summary or explanation if agreed to by the individual in accordance 
with proposed Sec.  164.524(c)(2)(iii)) in the electronic form and 
format requested or in an otherwise agreed upon electronic form and 
format. While an individual's right of access to an electronic copy of 
protected health information is currently limited under the Privacy 
Rule by whether the form or format requested is readily producible, 
covered entities that maintain such information electronically in a 
designated record set would be required under these proposed 
modifications to provide some type of electronic copy, if requested by 
an individual.
    Because we did not want to bind covered entities to standards that 
may not yet be technologically mature, we proposed to permit covered 
entities to make some other agreement with individuals as to an 
alternative means by which they may provide a readable electronic copy 
to the extent the requested means is not readily producible. If, for 
example, a covered entity received a request to provide electronic 
access via a secure web-based portal, but the only readily producible 
version of the protected health information was in portable document 
format (PDF), proposed Sec.  164.524(c)(2)(ii) would require the 
covered entity to provide the individual with a PDF copy of the 
protected health information, if agreed to by the covered entity and 
the individual. We noted that while a covered entity may provide 
individuals with limited access rights to their EHR, such as through a 
secure web-based portal, nothing under the current Rule or proposed 
modifications would require a covered entity to have this capability.
    We noted that the option of arriving at an alternative agreement 
that satisfies both parties is already part of the requirement to 
provide access under Sec.  164.524(c)(2)(i), so extension of such a 
requirement to electronic access should present few implementation 
difficulties. Further, as with other disclosures of protected health 
information, in providing the individual with an electronic copy of 
protected health information through a web-based portal, email, on 
portable electronic media, or other means, covered entities should 
ensure that reasonable safeguards are in place to protect the 
information. We also noted that the proposed modification presumes that 
covered entities have the capability of providing an electronic copy of 
protected health information maintained in their designated record 
set(s) electronically through a secure web-based portal, via email, on 
portable electronic media, or other manner. We invited public comment 
on this presumption.
Overview of Public Comments
    We received many comments and requests for clarification and 
guidance regarding the permitted methods for offering protected health 
information on electronic media, and the acceptable form and format of 
the electronic copy. Several commenters suggested that covered entities 
be permitted flexibility in determining available electronic formats 
and requested clarification on what is considered ``readily 
producible.'' These commenters expressed concerns that a limited number 
of permissible electronic formats may result in a situation where 
protected health information could not be converted from a particular 
electronic system. Other commenters indicated that there should be 
minimum standards and clearly defined media that are permissible to 
meet this requirement. One commenter felt that this requirement is 
important but should be deferred until covered entities have improved 
their technological capabilities.
    Many commenters requested guidance on how to proceed if a covered 
entity and an individual are unable to come to an agreement on the 
medium of choice and what is expected in terms of accommodating the 
individual's medium of choice. Some commenters suggested various 
alternate solutions if

[[Page 5633]]

an agreement cannot be reached, including any readily producible 
format, PDF, or hard copy protected health information. Some covered 
entities felt that individuals should not have an unlimited choice in 
terms of the electronic media they are willing to accept, and should 
only be permitted to confine their choices of electronic media to a 
couple of options that the covered entity has available.
Final Rule
    The final rule adopts the proposal to require covered entities to 
provide electronic information to an individual in the electronic form 
and format requested by the individual, if it is readily producible, 
or, if not, in a readable electronic form and format as agreed to by 
the covered entity and the individual. We recognize that what is 
available in a readable electronic form and format will vary by system 
and that covered entities will continue to improve their technological 
capabilities over time. We therefore allow covered entities the 
flexibility to provide readily producible electronic copies of 
protected health information that are currently available on their 
various systems. A covered entity is not required to purchase new 
software or systems in order to accommodate an electronic copy request 
for a specific form that is not readily producible by the covered 
entity at the time of the request, provided that the covered entity is 
able to provide some form of electronic copy. We note that some legacy 
or other systems may not be capable of providing any form of electronic 
copy at present and anticipate that some covered entities may need to 
make some investment in order to meet the basic requirement to provide 
some form of electronic copy.
    We agree with covered entities that individuals should not have an 
unlimited choice in the form of electronic copy requested. However, 
covered entities must still provide individuals with some kind of 
readable electronic copy. If an individual requests a form of 
electronic copy that the covered entity is unable to produce, the 
covered entity must offer other electronic formats that are available 
on their systems. If the individual declines to accept any of the 
electronic formats that are readily producible by the covered entity, 
the covered entity must provide a hard copy as an option to fulfill the 
access request. While we remain neutral on the type of technology that 
covered entities may adopt, a PDF is a widely recognized format that 
would satisfy the electronic access requirement if it is the 
individual's requested format or if the individual agrees to accept a 
PDF instead of the individual's requested format. Alternatively, there 
may be circumstances where an individual prefers a simple text or rich 
text file and the covered entity is able to accommodate this 
preference. A hard copy of the individual's protected health 
information would not satisfy the electronic access requirement. 
However, a hard copy may be provided if the individual decides not to 
accept any of the electronic formats offered by the covered entity.
Response to Other Public Comments
    Comment: Several covered entities commented on the form of a 
request for access to electronic protected health information. Some 
expressed appreciation for permitting an electronic request process, 
including e-signatures and authentication. Some expressed opposition to 
the requirement for a signed request in writing, as it would be highly 
burdensome and cause delays. Covered entities sought guidance on 
elements that would be required or permitted in a request form for 
individuals.
    Response: We clarify that the requirement at Sec.  164.524(b)(1), 
which states that the covered entity may require individuals to make 
requests for access in writing, provided that it informs individuals of 
such a requirement, remains unchanged. Therefore, covered entities may 
at their option require individuals to make requests for electronic 
copies of their protected health information in writing. We note that 
the Privacy Rule allows for electronic documents to qualify as written 
documents, as well as electronic signatures to satisfy any requirements 
for a signature, to the extent the signature is valid under applicable 
law. If the covered entity chooses to require a written request, it has 
flexibility in determining what information to put into the request 
form. However, the request form may not be in any way designed to 
discourage an individual from exercising his or her right. A covered 
entity may also choose to accept an individual's oral request for an 
electronic copy of their protected health information without written 
signature or documentation.
    Comment: We received several comments on the content that covered 
entities are required to provide in response to an electronic access 
request. Some commenters felt that there should be a defined minimum 
set of data elements to satisfy this requirement, particularly for non-
EHR data. Covered entities also requested clarification on how to 
handle links to images or other data.
    Response: We clarify that just as is currently required for hard 
copy protected health information access requests, covered entities 
must provide an electronic copy of all protected health information 
about the individual in an electronically maintained designated record 
set, except as otherwise provided at Sec.  164.524(a). If the 
designated record set includes electronic links to images or other 
data, the images or other data that is linked to the designated record 
set must also be included in the electronic copy provided to the 
individual. The electronic copy must contain all protected health 
information electronically maintained in the designated record set at 
the time the request is fulfilled. The individual may request, however, 
only a portion of the protected health information electronically 
maintained in the designated record set, in which case the covered 
entity is only required to provide the requested information.
    Comment: One commenter asserted that the request for protected 
health information should only apply to protected health information 
the covered entity has at the time of the request, not any additional 
protected health information that it obtains while processing the 
request.
    Response: We clarify that the electronic copy must reflect all 
electronic protected health information held by the covered entity in a 
designated record set, or the subset of electronic protected health 
information specifically requested by the individual, at the time the 
request is fulfilled.
    Comment: One commenter asked for confirmation that the new 
electronic requirement does not include a requirement to scan paper and 
provide electronic copies of records held in paper form.
    Response: We clarify that covered entities are not required to scan 
paper documents to provide electronic copies of records maintained in 
hard copy. We note that for covered entities that have mixed media, it 
may in some cases be easier to scan and provide all records in 
electronic form rather than provide a combination of electronic and 
hard copies, however this is in no way required.
    Comment: Many commenters expressed security concerns related to 
this new requirement. Covered entities felt that they should not have 
to use portable devices brought by individuals (particularly flash 
drives), due to the security risks that this would introduce to their 
systems. Some covered entities

[[Page 5634]]

additionally asserted that requiring the use of individually-supplied 
media is prohibited by the Security Rule, based on the risk analysis 
determination of an unacceptable risk to the confidentiality, integrity 
and availability of the covered entity's electronic protected health 
information.
    Response: We acknowledge these security concerns and agree with 
commenters that it may not be appropriate for covered entities to 
accept the use of external portable media on their systems. Covered 
entities are required by the Security Rule to perform a risk analysis 
related to the potential use of external portable media, and are not 
required to accept the external media if they determine there is an 
unacceptable level of risk. However, covered entities are not then 
permitted to require individuals to purchase a portable media device 
from the covered entity if the individual does not wish to do so. The 
individual may in such cases opt to receive an alternative form of the 
electronic copy of the protected health information, such as through 
email.
    Comment: Several commenters specifically commented on the option to 
provide electronic protected health information via unencrypted email. 
Covered entities requested clarification that they are permitted to 
send individuals unencrypted emails if they have advised the individual 
of the risk, and the individual still prefers the unencrypted email. 
Some felt that the ``duty to warn'' individuals of risks associated 
with unencrypted email would be unduly burdensome on covered entities. 
Covered entities also requested clarification that they would not be 
responsible for breach notification in the event that unauthorized 
access of protected health information occurred as a result of sending 
an unencrypted email based on an individual's request. Finally, one 
commenter emphasized the importance that individuals are allowed to 
decide if they want to receive unencrypted emails.
    Response: We clarify that covered entities are permitted to send 
individuals unencrypted emails if they have advised the individual of 
the risk, and the individual still prefers the unencrypted email. We 
disagree that the ``duty to warn'' individuals of risks associated with 
unencrypted email would be unduly burdensome on covered entities and 
believe this is a necessary step in protecting the protected health 
information. We do not expect covered entities to educate individuals 
about encryption technology and the information security. Rather, we 
merely expect the covered entity to notify the individual that there 
may be some level of risk that the information in the email could be 
read by a third party. If individuals are notified of the risks and 
still prefer unencrypted email, the individual has the right to receive 
protected health information in that way, and covered entities are not 
responsible for unauthorized access of protected health information 
while in transmission to the individual based on the individual's 
request. Further, covered entities are not responsible for safeguarding 
information once delivered to the individual.
b. Third Parties
Proposed Rule
    Section 164.524(c)(3) of the Privacy Rule currently requires the 
covered entity to provide the access requested by the individual in a 
timely manner, which includes arranging with the individual for a 
convenient time and place to inspect or obtain a copy of the protected 
health information, or mailing the copy of protected health information 
at the individual's request. The Department had previously interpreted 
this provision as requiring a covered entity to mail the copy of 
protected health information to an alternative address requested by the 
individual, provided the request was clearly made by the individual and 
not a third party. Section 13405(e)(1) of the HITECH Act provides that 
if the individual chooses, he or she has a right to direct the covered 
entity to transmit an electronic copy of protected health information 
in an EHR directly to an entity or person designated by the individual, 
provided that such choice is clear, conspicuous, and specific.
    Based on section 13405(e)(1) of the HITECH Act and our authority 
under section 264(c) of HIPAA, we proposed to expand Sec.  
164.524(c)(3) to expressly provide that, if requested by an individual, 
a covered entity must transmit the copy of protected health information 
directly to another person designated by the individual. This proposed 
amendment is consistent with the Department's prior interpretation on 
this issue and would apply without regard to whether the protected 
health information is in electronic or paper form. We proposed to 
implement the requirement of section 13405(e)(1) that the individual's 
``choice [be] clear, conspicuous, and specific'' by requiring that the 
individual's request be ``in writing, signed by the individual, and 
clearly identify the designated person and where to send the copy of 
protected health information.'' We noted that the Privacy Rule allows 
for electronic documents to qualify as written documents for purposes 
of meeting the Rule's requirements, as well as electronic signatures to 
satisfy any requirements for a signature, to the extent the signature 
is valid under applicable law. Thus, a covered entity could employ an 
electronic process for receiving an individual's request to transmit a 
copy of protected health information to his or her designee under this 
proposed provision. Whether the process is electronic or paper-based, a 
covered entity must implement reasonable policies and procedures under 
Sec.  164.514(h) to verify the identity of any person who requests 
protected health information, as well as implement reasonable 
safeguards under Sec.  164.530(c) to protect the information that is 
used or disclosed.
Overview of Public Comments
    Commenters requested clarification regarding the proposal to 
transmit an electronic copy of protected health information to another 
person designated by the individual. In particular, covered entities 
sought clarification on whether or not an authorization is required 
prior to transmitting the requested electronic protected health 
information to a third party designated by the individual. Some 
commenters supported the ability to provide electronic protected health 
information access to third parties without individual authorization, 
while others felt that authorization should be required. Covered 
entities requested clarification that they are not liable when making 
reasonable efforts to verify the identity of a third party recipient 
identified by the individual.
Final Rule
    The final rule adopts the proposed amendment Sec.  164.524(c)(3) to 
expressly provide that, if requested by an individual, a covered entity 
must transmit the copy of protected health information directly to 
another person designated by the individual. In contrast to other 
requests under Sec.  164.524, when an individual directs the covered 
entity to send the copy of protected health information to another 
designated person, the request must be made in writing, signed by the 
individual, and clearly identify the designated person and where to 
send the copy of the protected health information. If a covered entity 
has decided to require all access requests in writing, the third party 
recipient information and signature by the individual can be included 
in the same written request; no additional or separate written request 
is

[[Page 5635]]

required. This written request for protected health information to be 
sent to a designated person is distinct from an authorization form, 
which contains many additional required statements and elements (see 
Sec.  164.508(c)). Covered entities may rely on the information 
provided in writing by the individual when providing protected health 
information to a third party recipient identified by the individual, 
but must also implement reasonable policies and procedures under Sec.  
164.514(h) to verify the identity of any person who requests protected 
health information, as well as implement reasonable safeguards under 
Sec.  164.530(c) to protect the information that is used or disclosed. 
For example, reasonable safeguards would not require the covered entity 
to confirm that the individual provided the correct email address of 
the third party, but would require reasonable procedures to ensure that 
the covered entity correctly enters the email address into its system.
c. Fees
Proposed Rule
    Section 164.524(c)(4) of the Privacy Rule currently permits a 
covered entity to impose a reasonable, cost-based fee for a copy of 
protected health information (or a summary or explanation of such 
information). However, such a fee may only include the cost of: (1) The 
supplies for, and labor of, copying the protected health information; 
(2) the postage associated with mailing the protected health 
information, if applicable; and (3) the preparation of an explanation 
or summary of the protected health information, if agreed to by the 
individual. With respect to providing a copy (or summary or 
explanation) of protected health information from an EHR in electronic 
form, however, section 13405(e)(2) of the HITECH Act provides that a 
covered entity may not charge more than its labor costs in responding 
to the request for the copy.
    In response to section 13405(e)(2) of the HITECH Act, we proposed 
to amend Sec.  164.524(c)(4)(i) to identify separately the labor for 
copying protected health information, whether in paper or electronic 
form, as one factor that may be included in a reasonable cost-based 
fee. While we did not propose more detailed considerations for this 
factor within the regulatory text, we retained all prior 
interpretations of labor with respect to paper copies--that is, that 
the labor cost of copying may not include the costs associated with 
searching for and retrieving the requested information. With respect to 
electronic copies, we asserted that a reasonable cost-based fee 
includes costs attributable to the labor involved to review the access 
request and to produce the electronic copy, which we expected would be 
negligible. However, we did not consider a reasonable cost-based fee to 
include a standard ``retrieval fee'' that does not reflect the actual 
labor costs associated with the retrieval of the electronic information 
or that reflects charges that are unrelated to the individual's request 
(e.g., the additional labor resulting from technical problems or a 
workforce member's lack of adequate training). We invited public 
comment on this aspect of our rulemaking, specifically with respect to 
what types of activities related to managing electronic access requests 
should be compensable aspects of labor.
    We also proposed to amend Sec.  164.524(c)(4)(ii) to provide 
separately for the cost of supplies for creating the paper copy or 
electronic media (i.e., physical media such as a compact disc (CD) or 
universal serial bus (USB) flash drive), if the individual requests 
that the electronic copy be provided on portable media. This 
reorganization and the addition of the phrase ``electronic media'' 
reflected our understanding that since section 13405(e)(2) of the 
HITECH Act permits only the inclusion of labor costs in the charge for 
electronic copies, it by implication excludes charging for the supplies 
that are used to create an electronic copy of the individual's 
protected health information, such as the hardware (computers, 
scanners, etc.) or software that is used to generate an electronic copy 
of an individual's protected health information in response to an 
access request. We noted that this limitation is in contrast to a 
covered entity's ability to charge for supplies for hard copies of 
protected health information (e.g., the cost of paper, the prorated 
cost of toner and wear and tear on the printer). See 65 FR 82462, 
82735, Dec. 28, 2000 (responding to a comment seeking clarification on 
``capital cost for copying'' and other supply costs by indicating that 
a covered entity was free to recoup all of their reasonable costs for 
copying). We asserted that this interpretation was consistent with the 
fact that, unlike a hard copy, which generally exists on paper, an 
electronic copy exists independent of media, and can be transmitted 
securely via multiple methods (e.g., email, a secure web-based portal, 
or an individual's own electronic media) without accruing any ancillary 
supply costs. We also noted, however, that our interpretation of the 
statute would permit a covered entity to charge a reasonable and cost-
based fee for any electronic media it provided, as requested or agreed 
to by an individual.
    While we proposed to renumber the remaining factors at Sec.  
164.524(c)(4), we did not propose to amend their substance. With 
respect to Sec.  164.524(c)(4)(iii), however, we noted that our 
interpretation of the statute would permit a covered entity to charge 
for postage if an individual requests that the covered entity transmit 
portable media containing an electronic copy through mail or courier 
(e.g., if the individual requests that the covered entity save 
protected health information to a CD and then mail the CD to a 
designee).
Overview of Public Comments
    Commenters generally supported and appreciated the inclusion of a 
reasonable, cost-based fee that includes both labor and, in some cases, 
supply costs to support the new electronic access requirement. Several 
commenters disagreed that the cost related to reviewing and responding 
to requests would be negligible, particularly if the scope includes 
information in designated record sets and not only EHRs, since more 
technically trained staff would be necessary to perform this function.
    Commenters provided many suggestions of costs that should be 
permitted in the fees, including those associated with labor, 
materials, systems, retrieval (particularly for old data maintained in 
archives, backup media or legacy systems), copying, transmission, and 
capital to recoup the significant investments made for data access, 
storage and infrastructure. Commenters offered additional suggestions 
on labor-related costs, including: skilled technical staff time; time 
spent recovering, compiling, extracting, scanning and burning protected 
health information to media, and distributing the media; and 
preparation of an explanation or summary if appropriate. Suggestions of 
materials-related costs included: CDs, flash drives, tapes or other 
portable media; new types of technology needed to comply with 
individual requests; office supplies; and mail copies. Systems-related 
costs included: software necessary to conduct protected health 
information searches; and implementation and maintenance of security 
systems and secure connectivity.
Final Rule
    The final rule adopts the proposed amendment at Sec.  
164.524(c)(4)(i) to identify separately the labor for copying protected 
health information, whether

[[Page 5636]]

in paper or electronic form, as one factor that may be included in a 
reasonable cost-based fee. We acknowledge commenters' assertions that 
the cost related to searching for and retrieving electronic protected 
health information in response to requests would be not be negligible, 
as opposed to what we had anticipated, particularly in regards to 
designated record set access that will require more technically trained 
staff to perform this function. We clarify that labor costs included in 
a reasonable cost-based fee could include skilled technical staff time 
spent to create and copy the electronic file, such as compiling, 
extracting, scanning and burning protected health information to media, 
and distributing the media. This could also include the time spent 
preparing an explanation or summary of the protected health 
information, if appropriate.
    The final rule also adopts the proposed amendment at Sec.  
164.524(c)(4)(ii) to provide separately for the cost of supplies for 
creating the paper copy or electronic media (i.e., physical media such 
as a compact disc (CD) or universal serial bus (USB) flash drive), if 
the individual requests that the electronic copy be provided on 
portable media. We do not require that covered entities obtain new 
types of technology needed to comply with specific individual requests, 
and therefore the cost of obtaining such new technologies is not a 
permissible fee to include in the supply costs.
    With respect to Sec.  164.524(c)(4)(iii), we clarify that a covered 
entity is permitted to charge for postage if an individual requests 
that the covered entity transmit portable media containing an 
electronic copy through mail or courier (e.g., if the individual 
requests that the covered entity save protected health information to a 
CD and then mail the CD to a designee).
    Fees associated with maintaining systems and recouping capital for 
data access, storage and infrastructure are not considered reasonable, 
cost-based fees, and are not permissible to include under this 
provision. Covered entities are not required to adopt or purchase new 
systems under this provision, and thus any costs associated with 
maintaining them are present regardless of the new electronic access 
right. Additionally, although the proposed rule indicated that a 
covered entity could charge for the actual labor costs associated with 
the retrieval of electronic information, in this final rule we clarify 
that a covered entity may not charge a retrieval fee (whether it be a 
standard retrieval fee or one based on actual retrieval costs). This 
interpretation will ensure that the fee requirements for electronic 
access are consistent with the requirements for hard copies, which do 
not allow retrieval fees for locating the data.
Response to Other Public Comments
    Comment: Commenters requested clarification on how to proceed when 
State laws designate fees.
    Response: When a State law provides a limit on the fee that a 
covered entity may charge for a copy of protected health information, 
this is relevant in determining whether a covered entity's fee is 
``reasonable'' under Sec.  164.524(c)(4). A covered entity's fee must 
be both reasonable and cost-based. For example, if a State permits a 
charge of 25 cents per page, but a covered entity is able to provide an 
electronic copy at a cost of five cents per page, then the covered 
entity may not charge more than five cents per page (since that is the 
reasonable and cost-based amount). Similarly, if a covered entity's 
cost is 30 cents per page but the State law limits the covered entity's 
charge to 25 cents per page, then the covered entity may not charge 
more than 25 cents per page (since charging 30 cents per page would be 
the cost-based amount, but would not be reasonable in light of the 
State law).
    Comment: One commenter suggested that labor-related costs should 
include preparation of an affidavit certifying that the information is 
a true and correct copy of the records.
    Response: We do not consider the cost to prepare an affidavit to be 
a copying cost. Thus, where an individual requests that an affidavit 
accompany the copy of protected health information requested by the 
individual for litigation purposes or otherwise, a covered entity may 
charge the individual for the preparation of such affidavit and is not 
subject to the reasonable, cost-based fee limitations of Sec.  
164.524(c)(4). However, a covered entity may not withhold an 
individual's copy of his or her protected health information for 
failure by the individual to pay any fees for services above and beyond 
the copying, such as for preparing an affidavit.
    Comment: Some commenters recommended defining the following terms: 
``preparing,'' ``producing,'' and ``transmitting.''
    Response: We decline to define the terms ``preparing,'' 
``producing,'' and ``transmitting,'' as we believe the terms have been 
adequately understood and utilized in the context of hard copy access 
to protected health information.
d. Timeliness
Proposed Rule
    We requested comment on one aspect of the right to access and 
obtain a copy of protected health information which the HITECH Act did 
not amend. In particular, the HITECH Act did not change the timeliness 
requirements for provision of access at Sec.  164.524(b). Under the 
current requirements, a request for access must be approved or denied, 
and if approved, access or a copy of the information provided, within 
30 days of the request. In cases where the records requested are only 
accessible from an off-site location, the covered entity has an 
additional 30 days to respond to the request. In extenuating 
circumstances where access cannot be provided within these timeframes, 
the covered entity may have a one-time 30-day extension if the 
individual is notified of the need for the extension within the 
original timeframes.
    With regard to the timeliness of the provision of access, we 
recognized that with the advance of EHRs, there is an increasing 
expectation and capacity to provide individuals with almost 
instantaneous electronic access to the protected health information in 
those records through personal health records or similar electronic 
means. On the other hand, we did not propose to limit the right to 
electronic access of protected health information to certified EHRs, 
and the variety of electronic systems that are subject to this proposed 
requirement would not all be able to comply with a timeliness standard 
based on personal health record capabilities. It was our assumption 
that a single timeliness standard that would address a variety of 
electronic systems, rather than having a multitude of standards based 
on system capacity, would be the preferred approach to avoid 
workability issues for covered entities. Even under a single standard, 
nothing would prevent users of EHR systems from exceeding the Privacy 
Rule's timeliness requirements for providing access to individuals. 
Additionally, the Medicare and Medicaid EHR Incentive Programs (the 
``meaningful use'' programs) require users of Certified EHR Technology 
to provide individuals with expedited access to information. Based on 
the assumption that a single standard would be the preferred approach 
under the Privacy Rule, we requested public comment on an appropriate, 
common timeliness standard for the provision of access by covered 
entities with electronic designated record sets generally. We 
specifically requested comment on aspects of existing systems

[[Page 5637]]

that would create efficiencies in processing of requests for electronic 
information, as well as those aspects of electronic systems that would 
provide little change from the time required for processing a paper 
record. Alternatively, we requested comment on whether the current 
standard could be altered for all systems, paper and electronic, such 
that all requests for access should be responded to without 
unreasonable delay and not later than 30 days.
    We also requested public comment on whether, contrary to our 
assumption, a variety of timeliness standards based on the type of 
electronic designated record set is the preferred approach and if so, 
how such an approach should be implemented.
    Finally, we requested comment on the time necessary for covered 
entities to review access requests and make necessary determinations, 
such as whether the granting of access would endanger the individual or 
other persons so as to better understand how the time needed for these 
reviews relates to the overall time needed to provide the individual 
with access. Further, we requested comment generally on whether the 
provision which allows a covered entity an additional 30 days to 
provide access to the individual if the protected health information is 
maintained off-site should be eliminated altogether for both paper and 
electronic records, or at least for protected health information 
maintained or archived electronically because the physical location of 
electronic data storage is not relevant to its accessibility.
Overview of Public Comments
    Commenters generally supported maintaining the same timeframe for 
response for both paper and electronic records and not modifying the 
existing timeframes for response. Commenters espoused many rationales 
for maintaining a single standard and the existing response standards, 
including that off-site electronic storage with back-up tapes will 
require time to obtain the electronic media, multiple electronic 
systems may need to be accessed, some systems may not have data stored 
in useable formats requiring time to convert data, and time may be 
required to obtain data from business associates and subcontractors.
    Some commenters acknowledged that electronic records may be easier 
to access, but review of records and verification processes would still 
require time that cannot be shortcut because a record is electronic. 
One commenter acknowledged that shorter times may be achievable when 
specific data set standards are established and covered entities have 
electronic records in place. One commenter believed that electronic 
records could be furnished in a much shorter timeframe, such as two 
business days.
    Several commenters suggested responses be done in much shorter 
timeframes, such as instantly, within one day or three days. One 
commenter noted that meaningful use standards required access within 
three days for 50 percent of patients. These commenters suggested 
alternative timeframes for adoption, such as allowing 60 days for 
response due to off-site storage issues and potential for multiple 
requests. One commenter suggested 30 and 60 day times were unworkable 
and another commenter suggested eliminating the 30 day extension for 
off-site record storage. One commenter suggested 30 days may be longer 
than is necessary, but cautioned against mandates that would 
unreasonably divert provider resources (e.g., five days would be 
unreasonable when a provider must take time to include explanatory 
notes).
Final Rule
    The final rule modifies the timeliness requirements for right to 
access and to obtain a copy of protected health information at Sec.  
164.524(b). We remove the provision at Sec.  164.524(b)(2)(ii) that 
permits 60 days for timely action when protected health information for 
access is not maintained or accessible to the covered entity on-site. 
We retain and renumber as necessary the provision at Sec.  
164.524(b)(2)(iii) that permits a covered entity a one-time extension 
of 30 days to respond to the individual's request (with written notice 
to the individual of the reasons for delay and the expected date by 
which the entity will complete action on the request).
    We believe the 30 day timeframe for access is appropriate and 
achievable by covered entities given the increasing expectation and 
capacity to provide individuals with almost instantaneous electronic 
access to the protected health information in those records through 
personal health records or similar electronic means. While a covered 
entity is permitted 30 days to provide access (with a 30-day extension 
when necessary), we encourage covered entities to provide individuals 
with access to their information sooner, and to take advantage of 
technologies that provide individuals with immediate access to their 
health information. Nevertheless, for covered entities that continue to 
make use of off-site storage or have additional time constraints to 
providing access, the 30 day extension remains available for a covered 
entity to exercise. This means, for example, that a covered entity must 
provide an individual with access to off-site records within 30 days of 
the individual's request when possible, with a 30-day extension 
available (for a total of 60 days, in contrast to the current law that 
permits up to 90 days to provide the individual with access to such 
records).
    We decline to establish separate timeframes for timely access based 
upon whether the protected health information to be accessed is paper 
or electronic. Commenters generally supported adoption of a single 
standard rather than differing standards based upon whether a record is 
paper or electronic and no comments provided compelling reasons to 
establish differing standards.
Response to Other Public Comments
    Comment: One commenter asked for clarification as to when the time 
period for responding to a response begins if the parties spend 
significant time attempting to reach agreement on the format of the 
electronic copy.
    Response: We confirm that the time period for responding to a 
request for access begins on the date of the request. Covered entities 
that spend significant time before reaching agreement on the electronic 
format for a response are using part of the 30 days permitted for 
response.
    Comment: One commenter suggested there should be a transition 
period for those covered entities that do not currently have the 
capability to meet the electronic access requirement.
    Response: We decline to implement a transition period for access to 
electronic copies of protected health information. Covered entities are 
already subject to the hard copy access requirement for all information 
held in designated record sets, including electronic designated record 
sets, and the new requirement for electronic copies gives covered 
entities the flexibility to provide an electronic copy in a form that 
is readily producible. We do not believe additional time is needed to 
provide electronic copies of protected health information that are 
readily producible.
11. Other Technical Changes and Conforming Changes
Proposed Rule
    We proposed to make a number of technical and conforming changes to 
the Privacy Rule to fix minor problems, such as incorrect cross-
references, mistakes of grammar, and typographical errors. These 
changes are shown in Table 3 below.

[[Page 5638]]



                                    Table 3--Technical and Conforming Changes
----------------------------------------------------------------------------------------------------------------
           Regulation section                Current language         Proposed change        Reason for change
----------------------------------------------------------------------------------------------------------------
164.510(b)(2)(iii)......................  ``based the exercise    Insert ``on'' after     Correct typographical
                                           of professional         ``based''.              error.
                                           Judgment''.
164.512(b)(1)...........................  ``Permitted             Insert ``uses and''     Correct inadvertent
                                           disclosures'' and       and ``use or'' before   omission.
                                           ``may disclose''.       ``disclosures'' and
                                                                   ``disclose,''
                                                                   respectively.
164.512(e)(1)(iii)......................  ``seeking protecting    Change ``protecting''   Correct typographical
                                           health information''.   to ``protected''.       error.
164.512(e)(1)(vi).......................  ``paragraph (e)(1)(iv)  Change ``(e)(1)(iv)''   Correct cross-
                                           of this section''.      to ``(e)(1)(v)''.       reference.
164.512(k)(3)...........................  ``authorized by 18      Remove the comma after  Correct typographical
                                           U.S.C. 3056, or to      ``U.S.C. 3056'' and     errors.
                                           foreign heads of        the ``to'' before
                                           state, or to for the    ``for''.
                                           conduct of
                                           investigations''.
----------------------------------------------------------------------------------------------------------------

    In addition to the above technical changes, we proposed to make a 
few clarifications to existing text in various provisions of the 
regulation not otherwise addressed in the above preamble. These are as 
follows.
    1. Section 164.506(c)(5) permits a covered entity to disclose 
protected health information ``to another covered entity that 
participates in the organized health care arrangement.'' We proposed to 
change the words ``another covered entity that participates'' to 
``other participants'' because not all participants in an organized 
health care arrangement may be covered entities; for example, some 
physicians with staff privileges at a hospital may not be covered 
entities.
    2. Section 164.510(a)(1)(ii) permits the disclosure of directory 
information to members of the clergy and other persons who ask for the 
individual by name. We proposed to add the words ``use or'' to this 
permission, to cover the provision of such information to clergy who 
are part of a facility's workforce.
    3. Section 164.510(b)(3) covers uses and disclosures of protected 
health information when the individual is not present to agree or 
object to the use or disclosure, and, as pertinent here, permits 
disclosure to persons only of ``the protected health information that 
is directly relevant to the person's involvement with the individual's 
health care.'' We proposed to delete the last two quoted words and 
substitute the following: ``care or payment related to the individual's 
health care or needed for notification purposes.'' This change aligns 
the text of paragraph (b)(3) with the permissions provided for at 
paragraph (b)(1) of this section.
    4. Where an employer needs protected health information to comply 
with workplace medical surveillance laws, such as the Occupational 
Safety and Health Administration or Mine Safety and Health 
Administration requirements, Sec.  164.512(b)(1)(v)(A) permits a 
covered entity to disclose, subject to certain conditions, protected 
health information of an individual to the individual's employer if the 
covered entity is a covered health care provider ``who is a member of 
the workforce of such employer or who provides health care to the 
individual at the request of the employer.'' We proposed to amend the 
quoted language by removing the words ``who is a member of the 
workforce of such employer or,'' as the language is unnecessary.
    5. At Sec.  164.512(k)(1)(ii), we proposed to replace the word 
``Transportation'' with ``Homeland Security.'' The language regarding a 
component of the Department of Transportation was included to refer to 
the Coast Guard; however, the Coast Guard was transferred to the 
Department of Homeland Security in 2003.
    6. At Sec.  164.512(k)(5), which permits a covered entity to 
disclose to a correctional institution or law enforcement official 
having lawful custody of an inmate or other individual protected health 
information about the inmate or individual in certain necessary 
situations, we proposed to replace the word ``and'' after the semicolon 
in paragraph (i)(E) with the word ``or.'' The intent of Sec.  
164.512(k)(5)(i) is not that the existence of all of the conditions is 
necessary to permit the disclosure, but rather that the existence of 
any would permit the disclosure.
Overview of Public Comments
    One commenter requested clarification about whether business 
associates may participate in an organized health care arrangement 
(OHCA) under Sec.  164.506(c)(5). Another commenter recommended against 
changing the language of Sec.  164.506(c)(5), arguing that such a 
change could bring entities like employers and pharmaceutical companies 
into OHCAs that should not otherwise have access to protected health 
information, and suggested that the Department change the language to 
make clear that an OHCA may include only professional staff members.
Final Rule
    The final rule implements the technical, conforming, and clarifying 
changes as proposed. In response to the comments regarding which 
entities may participate in an OHCA, we clarify that a covered entity 
participating in an OHCA or the OHCA itself may contract with a 
business associate to provide certain functions, activities, or 
services on its behalf that involve access to protected health 
information, provided the applicable requirements of Sec. Sec.  
164.502(e), 164.504(e), 164.308(b) and 164.314(a) are met. Further, the 
definition of an organized health care arrangement (OHCA) at Sec.  
160.103 includes a clinically integrated care setting in which 
individuals typically receive health care from more than one health 
care provider. We modified Sec.  164.506(c)(5) as discussed above in 
recognition of the fact that not all participants in a clinically 
integrated care setting may be covered entities (e.g., hospital with 
physicians with staff privileges that are not workforce members). Such 
change does not permit employers and pharmaceutical representatives to 
receive access to protected health information from or through an OHCA 
in a manner they would otherwise be prohibited from now.

V. Modifications to the Breach Notification Rule Under the HITECH Act

A. Background

    Section 13402 of the HITECH Act requires HIPAA covered entities to 
provide notification to affected individuals and to the Secretary of 
HHS following the discovery of a breach of unsecured protected health 
information. In some cases, the Act requires covered entities also to 
provide notification to the media of breaches. In the case of a breach 
of unsecured protected health

[[Page 5639]]

information at or by a business associate of a covered entity, the Act 
requires the business associate to notify the covered entity of the 
breach. Finally, the Act requires the Secretary to post on an HHS Web 
site a list of covered entities that experience breaches of unsecured 
protected health information involving more than 500 individuals.
    Section 13400(1) of the Act defines ``breach'' to mean, generally, 
the unauthorized acquisition, access, use, or disclosure of protected 
health information which compromises the security or privacy of such 
information. The Act includes three exceptions to this definition to 
encompass situations Congress clearly intended not to constitute 
breaches: (1) Unintentional acquisition, access, or use of protected 
health information by an employee or other person acting under the 
authority of a covered entity or business associate if such 
acquisition, access, or use was made in good faith and within the 
course and scope of the employment or other professional relationship 
of such person with the covered entity or business associate and such 
information is not further acquired, accessed, used, or disclosed by 
any person (section 13400(1)(B)(i)); (2) inadvertent disclosure of 
protected health information from one person authorized to access 
protected health information at a facility operated by a covered entity 
or business associate to another person similarly situated at the same 
facility and the information received is not further acquired, 
accessed, used or disclosed without authorization by any person 
(section 13400(1)(B)(ii) and (iii)); and (3) unauthorized disclosures 
in which an unauthorized person to whom protected health information is 
disclosed would not reasonably have been able to retain the information 
(section 13400(1)(A)).
    Further, section 13402(h) of the Act defines ``unsecured protected 
health information'' as ``protected health information that is not 
secured through the use of a technology or methodology specified by the 
Secretary in guidance'' and provides that the guidance specify the 
technologies and methodologies that render protected health information 
unusable, unreadable, or indecipherable to unauthorized individuals. 
Covered entities and business associates that implement the specified 
technologies and methodologies with respect to protected health 
information are not required to provide notifications in the event of a 
breach of such information--that is, the information is not considered 
``unsecured'' in such cases. As required by the Act, the Secretary 
initially issued this guidance on April 17, 2009 (it was subsequently 
published at 74 FR 19006 on April 27, 2009). The guidance listed and 
described encryption and destruction as the two technologies and 
methodologies for rendering protected health information unusable, 
unreadable, or indecipherable to unauthorized individuals.
    In cases in which notification is required, the Act at section 
13402 prescribes the timeliness, content, and methods of providing the 
breach notifications.
    Section 13402 required HHS to issue within 180 days of enactment 
interim final regulations to implement these breach notification 
requirements. The Department issued an interim final rule on August 24, 
2009, with a 60-day public comment period (74 FR 42740). The interim 
final rule became effective on September 23, 2009. In the preamble to 
the interim final rule, the Department also re-issued without 
substantive change its Guidance Specifying the Technologies and 
Methodologies That Render Protected Health Information Unusable, 
Unreadable, or Indecipherable to Unauthorized Individuals that was 
initially issued on April 17, 2009. The Guidance continues to specify 
encryption and destruction as the two methods for rendering protected 
health information unusable, unreadable, or indecipherable to 
unauthorized individuals--or ``secured''--and thus, exempt from the 
breach notification obligations. See 74 FR 42741-43.

B. Overview of the Interim Final Rule

    The interim final rule added a new subpart D to part 164 of title 
45 of the Code of Federal Regulations (CFR) to implement the breach 
notification provisions of section 13402 of the HITECH Act. In 
developing the interim final rule, the Department consulted closely 
with the Federal Trade Commission (FTC), which administers similar 
breach notification requirements on vendors of personal health records 
(PHRs) and their third party service providers under section 13407 of 
the HITECH Act. The interim final rule and FTC's Health Breach 
Notification Rule (74 FR 42962, published August 25, 2009) made clear 
that entities operating as HIPAA covered entities and business 
associates are subject to HHS', and not the FTC's, breach notification 
rule. Second, to address those limited cases where an entity may be 
subject to both HHS' and the FTC's rules, such as a vendor that offers 
PHRs to customers of a HIPAA covered entity as a business associate and 
also offers PHRs directly to the public, both sets of regulations were 
harmonized by including the same or similar language, within the 
constraints of the statutory language.
    The 60-day public comment period on the interim final rule closed 
on October 23, 2009. The Department received approximately 120 comments 
during the comment period from a variety of entities, including health 
care providers, hospital and medical associations, health plans, 
educational institutions, information technology companies, privacy and 
security advocates, consumer groups, state agencies, and several 
members of Congress. The provisions of the interim final rule are 
discussed in more detail below, along with the public comments 
received, and the provisions of this final rule.

C. Section-by-Section Description of Final Rule and Response to 
Comments

1. Section 164.402--Definitions
a. Definition of ``Breach''
Interim Final Rule
    Section 13400(1)(A) of the Act defines ``breach'' as the 
``unauthorized acquisition, access, use, or disclosure of protected 
health information which compromises the security or privacy of such 
information, except where an unauthorized person to whom such 
information is disclosed would not reasonably have been able to retain 
such information.'' Section 13400(1)(B) of the Act provides two 
additional exceptions to the definition of ``breach.'' The interim 
final rule at 45 CFR 164.402 defined a ``breach'' to mean generally 
``the acquisition, access, use, or disclosure of protected health 
information in a manner not permitted [by the Privacy Rule] which 
compromises the security or privacy of the protected health 
information.'' The definition included the statutory exceptions to the 
definition (discussed below) and clarified that ``unauthorized'' for 
purposes of the statute meant in a manner not permitted by the Privacy 
Rule.
    In addition, for purposes of this definition, the rule provided 
that ``compromises the security or privacy of the protected health 
information'' means poses a significant risk of financial, 
reputational, or other harm to the individual. The Department included 
this standard regarding a significant risk of harm to the individual 
(i.e., harm standard) after considering public comment received in 
response to the Department's request for information on the HITECH 
Act's breach notification provisions. See 74 FR 19006. The inclusion of 
the harm standard was intended to align the Department's rule with many 
State

[[Page 5640]]

breach notification laws, as well as existing obligations on Federal 
agencies pursuant to OMB Memorandum M-07-16, that have similar 
standards for triggering breach notification. In addition, the standard 
was intended to ensure that consumers were not flooded with breach 
notifications for inconsequential events, which could cause unnecessary 
anxiety and eventual apathy among consumers.
    To determine whether an impermissible use or disclosure of 
protected health information constitutes a breach under this standard, 
covered entities and business associates were required to perform a 
risk assessment to determine if there is a significant risk of harm to 
the individual as a result of the impermissible use or disclosure. In 
conducting the risk assessment, covered entities and business 
associates were to consider a number or combination of factors, 
including who impermissibly used the information or to whom the 
information was impermissibly disclosed; whether the covered entity or 
business associate had taken steps to mitigate or eliminate the risk of 
harm; whether the protected health information was actually accessed; 
and what type or amount of protected health information was 
impermissibly used or disclosed.
    The rule provided further that an impermissible use or disclosure 
of protected health information that qualifies as a limited data set 
but also excludes dates of birth and zip codes (both identifiers that 
may otherwise be included in a limited data set) does not compromise 
the security or privacy of the protected health information. The 
Department included this narrow exception in the belief that it would 
be very difficult to re-identify a limited data set that excludes dates 
of birth and zip codes. Thus, a breach of such information would pose a 
low level of risk of harm to an individual.
    The interim final rule also included the three statutory exceptions 
to the definition of breach. To implement section 13400(1)(B)(i) of the 
Act, the first regulatory exception provided that a breach excludes any 
unintentional acquisition, access, or use of protected health 
information by a workforce member or person acting under the authority 
of a covered entity or business associate, if such acquisition, access, 
or use was made in good faith and within the scope of authority and 
does not result in further use or disclosure in a manner not permitted 
by the Privacy Rule. We substituted the term ``workforce members'' for 
the statutory term ``employees'' because ``workforce member'' is a 
defined term for purposes of the HIPAA Rules and means employees, 
volunteers, trainees, and other persons whose conduct, in the 
performance of work for a covered entity or business associate, is 
under the direct control of such covered entity or business associate.
    In addition to unintentional, good faith access to protected health 
information by workforce members, this exception covers similar access 
by a business associate of a covered entity or subcontractor with 
respect to a business associate or other person acting on behalf of a 
covered entity or business associate. The exception does not, however, 
cover situations involving snooping employees, because access as a 
result of such snooping would be neither unintentional nor done in good 
faith.
    To implement section 13400(1)(B)(ii) and (iii) of the Act, the 
second regulatory exception provided that a breach excludes inadvertent 
disclosures of protected health information from a person who is 
authorized to access protected health information at a covered entity 
or business associate to another person authorized to access protected 
health information at the same covered entity, business associate, or 
organized health care arrangement in which the covered entity 
participates. The regulatory exception includes reference to an 
``organized health care arrangement'' to capture, among other things, 
clinically integrated care settings in which individuals typically 
receive health care from more than one health care provider, such as a 
hospital, and the health care providers who have staff privileges at 
the hospital.
    In this regulatory exception, we also interpreted the statutory 
limitations that the disclosure be to ``another person similarly 
situated at the same facility'' to mean that the disclosure be to 
another person authorized to access protected health information (even 
if the two persons may not be authorized to access the same types of 
protected health information) at the same covered entity, business 
associate, or organized health care arrangement in which the covered 
entity participates (even if the covered entity, business associate, or 
organized health care arrangement has multiple facilities or locations 
across the country).
    Finally, to implement section 13400(1)(A) of the Act, the interim 
final rule exempted disclosures of protected health information where a 
covered entity or a business associate has a good faith belief that an 
unauthorized person to whom the disclosure was made would not 
reasonably have been able to retain such information. For example, if a 
covered entity, due to a lack of reasonable safeguards, sends a number 
of explanations of benefits (EOBs) to the wrong individuals and a few 
of the EOBs are returned by the post office, unopened, as 
undeliverable, the covered entity can conclude that the improper 
addressees could not reasonably have retained the information. The EOBs 
that were not returned as undeliverable, however, and that the covered 
entity knows were sent to the wrong individuals, should be treated as 
potential breaches. As another example, if a nurse mistakenly hands a 
patient the discharge papers belonging to another patient, but she 
quickly realizes her mistake and recovers the protected health 
information from the patient, this would not constitute a breach if the 
nurse can reasonably conclude that the patient could not have read or 
otherwise retained the information.
    With respect to any of the three exceptions discussed above, a 
covered entity or business associate has the burden of proof, pursuant 
to Sec.  164.414(b) (discussed below), for showing why breach 
notification was not required. Accordingly, the covered entity or 
business associate must document why the impermissible use or 
disclosure falls under one of the above exceptions.
Overview of Public Comments
    Of the approximately 85 public comments received on the interim 
final rule addressing the definition of breach, approximately 70 of 
those comments addressed the harm standard and risk assessment approach 
in the interim final rule. We received approximately 60 comments in 
support of the harm standard and the risk assessment approach. The 
commenters in support of this approach included providers, health 
plans, professional associations, and certain members of Congress. 
These commenters argued that the inclusion of the harm standard and 
accompanying risk assessment was consistent with the statutory 
language, aligned the interim final rule with many State breach 
notification laws and Federal policies, and appropriately placed the 
obligation to determine if a breach had occurred on covered entities 
and business associates since they had the requisite knowledge of the 
incident to best assess the likely impact of the impermissible use or 
disclosure.
    The proponents of the harm standard and risk assessment approach 
also argued that its removal would increase the cost and burden of 
implementing the rule for covered entities, business associates, as 
well as HHS, and may cause unnecessary anxiety and eventual

[[Page 5641]]

apathy among consumers if notifications are sent when there is no risk 
of harm to the individual.
    We also received approximately 10 comments opposed to the harm 
standard. Generally, the commenters opposed to this approach were 
members of Congress and consumer advocacy groups. Some opponents of the 
harm standard argued that its addition to the interim final rule set 
too high a bar for triggering breach notification, which was contrary 
to statutory intent. These commenters argued that the final rule should 
adopt a bright line standard for breach notification to ensure that 
individuals are aware of all impermissible uses and disclosures of 
their health information regardless of the potential risk and to make 
implementation and enforcement of the rule more uniform by removing the 
discretion and judgment given to covered entities in the interim final 
rule. These commenters argued that such transparency would better breed 
consumer trust and would allow individuals to assess the risk of harm 
themselves and take necessary measures to mitigate an impermissible use 
or disclosure of their health information.
    Other commenters, while opposed to a harm standard to trigger 
breach notification, nonetheless agreed that breach notification should 
not be required following every impermissible use or disclosure of 
unsecured protected health information no matter how inconsequential 
the breach. These commenters argued that, rather than a subjective 
standard measuring the risk of harm to an individual, the final rule 
should include a more objective standard against which entities would 
be required to assess risk. These commenters suggested that the risk 
assessment should focus on the risk that the protected health 
information was compromised instead of on the risk of harm to the 
individual. Additionally, these commenters proposed four factors that 
should be considered to determine whether the information was 
compromised: (1) To whom the information was impermissibly disclosed; 
(2) whether the information was actually accessed or viewed; (3) the 
potential ability of the recipient to identify the subjects of the 
data; and (4) in cases where the recipient is the disclosing covered 
entity's business associate or is another covered entity, whether the 
recipient took appropriate mitigating action.
    Some commenters stated that the default function of the rule was 
unclear. In particular, these commenters questioned whether the rule 
required notification of a breach unless it is determined that a 
significant risk of harm does not exist, or alternatively, required 
notification only in cases where significant risk of harm can be 
demonstrated. Other commenters suggested that we include in the 
definition an express presumption of a breach unless an entity can show 
otherwise.
    Additionally, many commenters responded to the treatment of limited 
data sets in the interim final rule. Although many commenters expressed 
support for the assertion that limited data sets that do not contain 
dates of birth and zip codes do not compromise the security or privacy 
of protected health information, most of these commenters expressed 
concern that the interim final rule did not go far enough and should 
exempt even those limited data sets that contain dates of birth and/or 
zip codes from the breach notification requirements. These commenters 
argued that no impermissible use or disclosure of a limited data set 
should trigger breach notification obligations because without the 16 
direct identifiers that the Privacy Rule requires to be stripped from 
the information, there is minimal risk of harm to the individual. 
Additionally, commenters indicated it would be costly and burdensome 
for entities to have to re-identify the information in a limited data 
set to provide notification and that re-identifying the information 
could also pose an additional risk of harm to the affected individuals. 
Finally, other commenters noted that because researchers commonly rely 
on limited data sets that contain dates of birth and zip codes, 
researchers would not be able to take advantage of the exception for 
certain limited data sets in the interim final rule, which may have the 
effect of deterring research.
    In contrast, some commenters expressed concern regarding the 
inclusion of even the limited exception to the definition of breach for 
limited data sets that do not include dates of birth and zip codes. 
These commenters supported requiring entities to perform a risk 
assessment to determine whether an impermissible use or disclosure of 
such information compromised the security or privacy of the 
information, as there may be a risk of re-identification of this 
information depending on who received the information.
Final Rule
    After considering the public comments on the definition, the 
Department in this final rule amends the definition of ``breach'' at 45 
CFR 164.402. Based on the comments, we recognize that the language used 
in the interim final rule and its preamble could be construed and 
implemented in manners we had not intended. Accordingly, this final 
rule modifies and clarifies the definition of breach and the risk 
assessment approach outlined in the interim final rule.
    First, we have added language to the definition of breach to 
clarify that an impermissible use or disclosure of protected health 
information is presumed to be a breach unless the covered entity or 
business associate, as applicable, demonstrates that there is a low 
probability that the protected health information has been compromised. 
We recognize that some persons may have interpreted the risk of harm 
standard in the interim final rule as setting a much higher threshold 
for breach notification than we intended to set. As a result, we have 
clarified our position that breach notification is necessary in all 
situations except those in which the covered entity or business 
associate, as applicable, demonstrates that there is a low probability 
that the protected health information has been compromised (or one of 
the other exceptions to the definition of breach applies). We believe 
that the express statement of this presumption in the final rule will 
help ensure that all covered entities and business associates interpret 
and apply the regulation in a uniform manner and also responds to 
commenters that indicated the default function of the rule was unclear. 
This new language is also consistent with Sec.  164.414, which provides 
that covered entities and business associates have the burden of proof 
to demonstrate that all notifications were provided or that an 
impermissible use or disclosure did not constitute a breach (such as by 
demonstrating through a risk assessment that there was a low 
probability that the protected health information had been compromised) 
and must maintain documentation sufficient to meet that burden of 
proof.
    Second, to further ensure that this provision is applied uniformly 
and objectively by covered entities and business associates, we have 
removed the harm standard and modified the risk assessment to focus 
more objectively on the risk that the protected health information has 
been compromised. Thus, breach notification is not required under the 
final rule if a covered entity or business associate, as applicable, 
demonstrates through a risk assessment that there is a low probability 
that the protected health information has been compromised, rather than 
demonstrate that there is no significant risk of harm to the individual 
as was provided under

[[Page 5642]]

the interim final rule. The final rule also identifies the more 
objective factors covered entities and business associates must 
consider when performing a risk assessment to determine if the 
protected health information has been compromised and breach 
notification is necessary.
    Although some commenters urged us to implement a bright line 
standard, requiring notification for all impermissible uses and 
disclosures without any assessment of risk, we believe that a risk 
assessment is necessary. The statute acknowledges, by including a 
specific definition of breach and identifying exceptions to this 
definition, as well as by providing that an unauthorized acquisition, 
access, use, or disclosure of protected health information must 
compromise the security or privacy of such information to be a breach, 
that there are several situations in which unauthorized acquisition, 
access, use, or disclosure of protected health information is so 
inconsequential that it does not warrant notification. In addition to 
the statutory exceptions that have been included in both the interim 
final rule and this final rule, there may be other similar situations 
that do not warrant breach notification. We agree with commenters that 
providing notification in such cases may cause the individual 
unnecessary anxiety or even eventual apathy if notifications of these 
types of incidents are sent routinely. For example, if a covered entity 
misdirects a fax containing protected health information to the wrong 
physician practice, and upon receipt, the receiving physician calls the 
covered entity to say he has received the fax in error and has 
destroyed it, the covered entity may be able to demonstrate after 
performing a risk assessment that there is a low risk that the 
protected health information has been compromised. Although this 
scenario does not fit into any of the statutory or regulatory 
exceptions, we believe that, like the exceptions to breach, 
notification should not be required if the covered entity demonstrates 
a low probability that the data has been compromised.
    Commenters argued that a rule containing a bright line standard for 
notification would be easier for both the regulated entities to 
implement and for HHS to enforce. We disagree. Although a rule that 
required notification following every impermissible use or disclosure 
may appear easier for covered entities and business associates to 
implement--as no determination of the risk that the protected health 
information has been compromised would be required--in effect, a bright 
line standard would be extremely burdensome and costly for entities to 
implement. With no risk assessment following an impermissible use or 
disclosure, entities may be required to provide many notices each year 
for incidents that did not compromise the security or privacy of an 
individual's protected health information.
    Although we do not believe a bright line approach to breach 
notification is appropriate, we do agree with the commenters who 
expressed concern that the risk assessment focus on ``harm to an 
individual'' in the interim final rule was too subjective and would 
lead to inconsistent interpretations and results across covered 
entities and business associates. As a result, instead of assessing the 
risk of harm to the individual, covered entities and business 
associates must assess the probability that the protected health 
information has been compromised based on a risk assessment that 
considers at least the following factors: (1) The nature and extent of 
the protected health information involved, including the types of 
identifiers and the likelihood of re-identification; (2) the 
unauthorized person who used the protected health information or to 
whom the disclosure was made; (3) whether the protected health 
information was actually acquired or viewed; and (4) the extent to 
which the risk to the protected health information has been mitigated. 
We believe that the use of these factors, which are derived from the 
factors listed in the interim final rule as well as many of the factors 
suggested by commenters, will result in a more objective evaluation of 
the risk to the protected health information and a more uniform 
application of the rule.
    As we have modified and incorporated the factors that must be 
considered when performing a risk assessment into the regulatory text, 
covered entities and business associates should examine their policies 
to ensure that when evaluating the risk of an impermissible use or 
disclosure they consider all of the required factors. In addition, 
given the circumstances of the impermissible use or disclosure, 
additional factors may need to be considered to appropriately assess 
the risk that the protected health information has been compromised. We 
note that, although we have included this risk assessment in the final 
rule, this type of assessment of risk should not be a new or different 
exercise for covered entities and business associates. Similar 
assessments of risk that data have been compromised must be performed 
routinely following security breaches and to comply with certain State 
breach notification laws.
    The first factor requires covered entities and business associates 
to evaluate the nature and the extent of the protected health 
information involved, including the types of identifiers and the 
likelihood of re-identification of the information. To assess this 
factor, entities should consider the type of protected health 
information involved in the impermissible use or disclosure, such as 
whether the disclosure involved information that is of a more sensitive 
nature. For example, with respect to financial information, this 
includes credit card numbers, social security numbers, or other 
information that increases the risk of identity theft or financial 
fraud. With respect to clinical information, this may involve 
considering not only the nature of the services or other information 
\11\ but also the amount of detailed clinical information involved 
(e.g., treatment plan, diagnosis, medication, medical history 
information, test results). Considering the type of protected health 
information involved in the impermissible use or disclosure will help 
entities determine the probability that the protected health 
information could be used by an unauthorized recipient in a manner 
adverse to the individual or otherwise used to further the unauthorized 
recipient's own interests. Additionally, in situations where there are 
few, if any, direct identifiers in the information impermissibly used 
or disclosed, entities should determine whether there is a likelihood 
that the protected health information released could be re-identified 
based on the context and the ability to link the information with other 
available information.\12\ For example, if a covered entity 
impermissibly disclosed a list of patient names, addresses, and 
hospital identification numbers, the protected health information is 
obviously identifiable, and a risk assessment likely would determine 
that there is more than a low probability that the information has been 
compromised, dependent on an assessment of the other factors discussed 
below. Alternatively, if the covered entity disclosed a list of patient 
discharge dates and diagnoses, the

[[Page 5643]]

entity would need to consider whether any of the individuals could be 
identified based on the specificity of the diagnosis, the size of the 
community served by the covered entity, or whether the unauthorized 
recipient of the information may have the ability to combine the 
information with other available information to re-identify the 
affected individuals (considering this factor in combination with the 
second factor discussed below). We emphasize, however, that the entity 
must evaluate all the factors, including those discussed below, before 
making a determination about the probability of risk that the protected 
health information has been compromised.
---------------------------------------------------------------------------

    \11\ We caution that many forms of health information, not just 
information about sexually transmitted diseases or mental health or 
substance abuse, are sensitive.
    \12\ Information that has been de-identified in accordance with 
45 CFR 164.514(a)-(c) is not protected health information, and thus, 
any inadvertent or unauthorized use or disclosure of such 
information is not considered a breach for purposes of this rule.
---------------------------------------------------------------------------

    The second factor requires covered entities and business associates 
to consider the unauthorized person who impermissibly used the 
protected health information or to whom the impermissible disclosure 
was made. Entities should consider whether the unauthorized person who 
received the information has obligations to protect the privacy and 
security of the information. For example, as discussed in the interim 
final rule, if protected health information is impermissibly disclosed 
to another entity obligated to abide by the HIPAA Privacy and Security 
Rules or to a Federal agency obligated to comply with the Privacy Act 
of 1974 and the Federal Information Security Management Act of 2002, 
there may be a lower probability that the protected health information 
has been compromised since the recipient of the information is 
obligated to protect the privacy and security of the information in a 
similar manner as the disclosing entity. We also emphasize that this 
factor should be considered in combination with the factor discussed 
above regarding the risk of re-identification. If the information 
impermissibly used or disclosed is not immediately identifiable, 
entities should determine whether the unauthorized person who received 
the protected health information has the ability to re-identify the 
information. For example, if information containing dates of health 
care service and diagnoses of certain employees was impermissibly 
disclosed to their employer, the employer may be able to determine that 
the information pertains to specific employees based on other 
information available to the employer, such as dates of absence from 
work. In this case, there may be more than a low probability that the 
protected health information has been compromised.
    Several commenters suggested that a risk assessment need be 
completed following only impermissible disclosures of protected health 
information, since information impermissibly ``used'' remains within 
the covered entity or business associate. We disagree. The final rule 
requires a risk assessment to be performed following both impermissible 
uses and disclosures (that do not otherwise fall within the other 
enumerated exceptions to breach). However, the fact that information 
only is impermissibly used within a covered entity or business 
associate and the impermissible use does not result in further 
impermissible disclosure outside the entity, is something that may be 
taken into account in conducting the risk assessment and may reduce the 
probability that the protected health information has been compromised.
    The third factor requires covered entities and business associates 
to investigate an impermissible use or disclosure to determine if the 
protected health information was actually acquired or viewed or, 
alternatively, if only the opportunity existed for the information to 
be acquired or viewed. For example, as we discussed in the interim 
final rule, if a laptop computer was stolen and later recovered and a 
forensic analysis shows that the protected health information on the 
computer was never accessed, viewed, acquired, transferred, or 
otherwise compromised, the entity could determine that the information 
was not actually acquired by an unauthorized individual even though the 
opportunity existed. In contrast, however, if a covered entity mailed 
information to the wrong individual who opened the envelope and called 
the entity to say that she received the information in error, then, in 
this case, the unauthorized recipient viewed and acquired the 
information because she opened and read the information to the extent 
that she recognized it was mailed to her in error.
    The final factor included in the final rule requires covered 
entities and business associates to consider the extent to which the 
risk to the protected health information has been mitigated. Covered 
entities and business associates should attempt to mitigate the risks 
to the protected health information following any impermissible use or 
disclosure, such as by obtaining the recipient's satisfactory 
assurances that the information will not be further used or disclosed 
(through a confidentiality agreement or similar means) or will be 
destroyed, and should consider the extent and efficacy of the 
mitigation when determining the probability that the protected health 
information has been compromised. We note that this factor, when 
considered in combination with the factor regarding the unauthorized 
recipient of the information discussed above, may lead to different 
results in terms of the risk to the protected health information. For 
example, a covered entity may be able to obtain and rely on the 
assurances of an employee, affiliated entity, business associate, or 
another covered entity that the entity or person destroyed information 
it received in error, while such assurances from certain third parties 
may not be sufficient. As described above, certain commenters suggested 
that mitigation should only be considered where the recipient of the 
information is a business associate of the covered entity or another 
covered entity. We do not in this rule limit this factor to those 
circumstances but, as discussed above, acknowledge that the recipient 
of the information will have an impact on whether the covered entity 
can conclude that an impermissible use or disclosure has been 
appropriately mitigated.
    A covered entity's or business associate's analysis of the 
probability that protected health information has been compromised 
following an impermissible use or disclosure must address each factor 
discussed above. Other factors may also be considered where necessary. 
Covered entities and business associates must then evaluate the overall 
probability that the protected health information has been compromised 
by considering all the factors in combination, and we expect these risk 
assessments to be thorough, completed in good faith, and for the 
conclusions reached to be reasonable. If an evaluation of the factors 
discussed above fails to demonstrate that there is a low probability 
that the protected health information has been compromised, breach 
notification is required. We do note, however, that a covered entity or 
business associate has the discretion to provide the required 
notifications following an impermissible use or disclosure of protected 
health information without performing a risk assessment. Because the 
final rule clarifies the presumption that a breach has occurred 
following every impermissible use or disclosure of protected health 
information, entities may decide to notify without evaluation of the 
probability that the protected health information has been compromised. 
In the future, we will issue additional guidance to aid covered 
entities and business associates in performing risk assessments with 
respect to frequently occurring scenarios.

[[Page 5644]]

    In addition to the removal of the harm standard and the creation of 
more objective factors to evaluate the probability that protected 
health information has been compromised, we have removed the exception 
for limited data sets that do not contain any dates of birth and zip 
codes. In the final rule, following the impermissible use or disclosure 
of any limited data set, a covered entity or business associate must 
perform a risk assessment that evaluates the factors discussed above to 
determine if breach notification is not required.
    The vast majority of commenters were not supportive of the 
exception for certain limited data sets outlined in the interim final 
rule, either because they believed the exception did not go far enough 
and would chill research that needed access to birth dates and zip 
codes in limited data sets, or because of concerns regarding the re-
identifiability of the limited information to which the exception 
applied. Based on the comments, we believe it is appropriate to require 
the impermissible use or disclosure of a limited data set, even those 
that do not contain dates of birth and zip codes, to be subject to a 
risk assessment to demonstrate that breach notification is not 
required. The final rule expressly includes a factor that would require 
consideration of the re-identifiability of the information, as well a 
factor that requires an assessment of the unauthorized person who used 
the protected health information or to whom the disclosure was made 
(i.e., whether this person has the ability to re-identify the affected 
individuals). Thus, the factors are particularly suited to address the 
probability that a data set without direct identifiers has been 
compromised following an impermissible use or disclosure. Further, we 
believe in most cases that the result would be the same under this 
final rule as under the interim final rule with respect to whether an 
impermissible use or disclosure of a limited data set that also 
excludes dates of birth and zip codes constitutes a breach for which 
notification is required. Due to the lack of identifiers present in the 
protected health information, entities may reasonably determine that 
there is a low probability of risk that the information has been 
compromised; however, we stress that this is a fact specific 
determination to be made based on the circumstances of the 
impermissible use or disclosure.
    We encourage covered entities and business associates to take 
advantage of the safe harbor provision of the breach notification rule 
by encrypting limited data sets and other protected health information 
pursuant to the Guidance Specifying the Technologies and Methodologies 
that Render Protected Health Information Unusable, Unreadable, or 
Indecipherable to Unauthorized Individuals (74 FR 42740, 42742). If 
protected health information is encrypted pursuant to this guidance, 
then no breach notification is required following an impermissible use 
or disclosure of the information.
    In addition to the comments discussed above, it was suggested that 
covered entities be required to include in their notice of privacy 
practices information about how a risk assessment will be conducted or 
their internal policies for determining whether a breach has occurred 
and notification is warranted. It was also suggested that the breach 
notice to the individual following discovery of a breach of unsecured 
protected health information contain information about the covered 
entity or business associate's risk assessment to help the individual 
better assess the level of threat posed by the breach and to better 
determine the appropriate steps, if any, to take.
    We decline to require that the covered entity's notice of privacy 
practices include a description of how a risk assessment will be 
conducted, although covered entities may include such information in 
their notice of privacy practices if they choose. While each risk 
assessment will differ depending on the specific facts and 
circumstances surrounding the impermissible use or disclosure, we 
believe that the modifications in this final rule will help ensure that 
covered entities and business associates perform risk assessments more 
uniformly and objectively. We also note that the content requirements 
for the notice to the individual outlined in Sec.  164.404(c) already 
require that the individual be notified of the circumstances of a 
breach, as well as what steps individuals should take to protect 
themselves from potential harm resulting from the breach.
    One commenter suggested that we require a covered entity to hire an 
independent organization to assess the risk of an impermissible use or 
disclosure to determine if breach notification is required. We do not 
believe such a requirement is necessary, although covered entities are 
free to engage independent organizations to assist in making such 
determinations provided that, if access to protected health information 
is required, business associate agreements are entered into to protect 
the information. Further, we believe the modifications in this final 
rule are conducive to more uniform risk assessments across covered 
entities and business associates. Additionally, as with the interim 
final rule, we note that covered entities and business associates have 
the burden of proof, pursuant to Sec.  164.414, to demonstrate that all 
notifications were provided or that an impermissible use or disclosure 
did not constitute a breach and to maintain documentation (e.g., of the 
risk assessment demonstrating that there was a low probability that the 
protected health information had been compromised or of the assessment 
that the impermissible use or disclosure falls within one of the other 
exceptions to breach), pursuant to 45 CFR 164.530(j)(1)(iv), as 
necessary to meet this burden of proof. Thus, covered entities and 
business associates have adequate incentive to conduct reasonable and 
diligent risk assessments.
    Finally, after reviewing and considering the comments received 
regarding the exceptions to the definition of breach in the interim 
final rule, the Department adopts these exceptions without modification 
in this final rule. Although the substance of these exceptions has not 
changed, these exceptions are now located at paragraph (1) of the 
definition of breach instead of paragraph (2) to accommodate the 
modifications discussed above. We respond to the public comments 
addressing these exceptions, as well as other comments received on the 
definition of ``breach,'' below.
Response to Other Public Comments
    Comment: Many commenters expressed concern that violations of the 
minimum necessary standard may trigger breach notification obligations.
    Response: We do not believe it would be appropriate to exempt 
minimum necessary violations from the breach notification obligations 
as we do not believe that all minimum necessary violations present a 
low probability that the protected health information has been 
compromised. Thus, uses or disclosures that impermissibly involve more 
than the minimum necessary information, in violation of Sec. Sec.  
164.502(b) and 164.514(d), may qualify as breaches. Such incidents must 
be evaluated as any other impermissible uses or disclosures to 
determine whether breach notification is not required.
    As explained above, there are several factors to be considered when 
determining the probability that the protected health information 
involved in an impermissible use or disclosure has been compromised, 
including the

[[Page 5645]]

unauthorized person who used the information or to whom the disclosure 
was made. Thus, where a minimum necessary violation occurs in a 
disclosure to a business associate or as an internal use within a 
covered entity or business associate, the fact that the information was 
not acquired by a third party would be considered as part of the risk 
assessment and may help lead to the conclusion that there is a low 
probability that the protected health information has been compromised. 
Alternatively, covered entities and business associates may determine 
that certain minimum necessary violations fall within the exceptions to 
the definition of breach at Sec.  164.402(1)(i) or (1)(ii).
    We note that the Privacy Rule's minimum necessary standard requires 
a covered entity to make reasonable efforts to limit access to 
protected health information to those persons or classes of persons who 
need access to protected health information to carry out their duties 
and to disclose an amount of protected health information reasonably 
necessary to achieve the purpose of a disclosure. The Privacy Rule 
requires covered entities to determine and define in their policies and 
procedures how the minimum necessary standard applies to their own uses 
and disclosures. Thus, covered entities are in a good position to know 
when such policies and procedures have been violated and to assess the 
probability that the incident has compromised the security or privacy 
of the information. Finally, we will consider including further 
guidance regarding the interaction between the minimum necessary 
standard and the breach notification requirements in the guidance 
required by section 13405(b)(1)(B) of the HITECH Act.
    Comment: Several commenters asked that we clarify the differences 
between ``acquisition,'' ``access,'' ``use,'' and ``disclosure'' in the 
exceptions in the final rule. These commenters expressed confusion 
regarding the use of these terms in the first two exceptions to the 
definition of breach, stating that the term ``acquisition'' connotes a 
disclosure of information, and thus, the exception regarding 
unintentional acquisition, access, or use of protected health 
information by a workforce member or person acting under the authority 
of a covered entity or business associate implicitly includes 
disclosures of protected health information.
    Response: While the Privacy Rule uses the terms ``use'' and 
``disclosure,'' we included both ``acquisition'' and ``access'' in the 
regulatory text for consistency with the statutory language. We 
interpret ``acquisition'' and ``access'' to information based on their 
plain meanings and believe that both terms are encompassed within the 
current definitions of ``use'' and ``disclosure'' in the HIPAA Rules. 
For example, an acquisition may be a ``use'' or ``disclosure'' 
depending on who acquired the information--i.e., a workforce member or 
someone outside the covered entity, such as a business associate.
    Comment: Several commenters supported our interpretations of the 
statutory terms ``employee,'' ``same facility,'' and ``similarly 
situated individual'' with respect to the exceptions to the definition 
of breach.
    Response: We retain these clarifications in this final rule.
    Comment: Some commenters asked that we use the term ``use'' instead 
of ``disclosure'' to describe the type of information exchange 
contemplated by the exception for certain inadvertent disclosures among 
persons similarly authorized to access protected health information at 
a covered entity or business associate since the information must be 
shared within a covered entity or business associate for the exception 
to apply.
    Response: We clarify that the exception at paragraph (1)(ii) of the 
definition of ``breach'' is intended to apply to certain 
``disclosures'' that may occur ``at'' a covered entity, business 
associate, or organized health care arrangement in which the covered 
entity participates--e.g., to persons onsite at a covered entity's 
facility that are not workforce members, such as physicians with staff 
privileges at a hospital. For impermissible ``uses'' of protected 
health information among workforce members of a covered entity or a 
business associate, a covered entity or business associate should 
determine whether the exception to breach at paragraph (1)(i) regarding 
certain unintentional acquisition, access, or use by a workforce member 
or person acting under the authority of a covered entity or business 
associate applies.
    Comment: One commenter asked if breach notification is required in 
cases where an impermissible use or disclosure originally qualifies for 
either of the exceptions to breach at Sec.  164.402(1)(i) or (1)(ii) at 
the time the incident occurs but later no longer fits within the 
exception because the protected health information is further used or 
disclosed in an impermissible manner.
    Response: The applicability of an exception to breach must be 
judged at the time the incident is discovered and evaluated. If an 
exception to breach is determined to apply such that notification is 
not warranted, the inquiry into that breach ends; however, the covered 
entity or business associate should take appropriate steps to ensure 
that the information is not further used or disclosed impermissibly. 
If, sometime after making the determination that the exception applied, 
the information is impermissibly used or disclosed, the covered entity 
or business associate should treat that incident as a separate 
impermissible use or disclosure that warrants evaluation as a breach on 
its own. As explained more fully below, we treat a breach as having 
occurred at the time of the impermissible use or disclosure, which in 
the case of the first two exceptions to breach, is at the time of the 
``further'' impermissible use or disclosure.
    Comment: One commenter asked that we broaden the application of the 
inadvertent disclosure exception to apply to all routine disclosures 
between covered entities. Other commenters asked that the rule exempt 
from the breach notification obligations situations in which a covered 
entity discloses information to a business associate or another covered 
entity. Commenters noted that because covered entities and business 
associates are required to protect the privacy of protected health 
information, there is little risk that even an impermissible disclosure 
between such entities would compromise the security or privacy of the 
information.
    Response: We do not agree that such situations warrant a blanket 
exception from the breach notification rules. In appropriate cases, 
some of these impermissible disclosures among covered entities and 
covered entities and business associates may fall within the existing 
exceptions to breach at paragraphs (1)(i) and (ii) of the definition. 
Otherwise, such disclosures must be evaluated as to the probability 
that the protected health information has been compromised based on a 
risk assessment of a number of factors. While the fact that the 
recipient of an impermissible disclosure is a covered entity or 
business associate with obligations to protect the privacy and security 
of protected health information is a consideration with respect to 
assessing the risk that the protected health information has been 
compromised, it is not the only factor. For example, a covered entity 
or business associate must also evaluate the extent to which the risk 
to the protected health information has been mitigated.
    Comment: Several commenters suggested that the exceptions to breach 
should not apply to situations where

[[Page 5646]]

workforce members or employees further use or disclose information they 
unintentionally or inadvertently acquired, accessed, or used, even if 
such further use or disclosure is permitted under the Privacy Rule. 
Additionally, these commenters suggested that the breach exceptions 
should apply only in cases in which the workforce member or employee 
has taken appropriate steps to mitigate the unintentional acquisition, 
access, or use of protected health information, such as by alerting the 
sender of the misdirected information, if applicable, and returning or 
destroying it.
    Response: We do not believe it is appropriate to prohibit the 
sharing of protected health information for permissible purposes 
following an unintentional or inadvertent error by a workforce member 
or an employee. Doing so would restrict access and disclosure of the 
protected health information for necessary treatment and other 
important purposes to the extent the workforce member or employee 
needed access to the information in the future for authorized purposes, 
which would adversely affect health care delivery. We believe that the 
rule strikes an appropriate balance by not allowing workforce member 
errors to be excepted from the definition of breach in cases where the 
workforce member takes the information he or she has mistakenly 
obtained and then misuses it.
    With respect to requiring workforce members or employees to take 
appropriate steps to mitigate their unintentional access to protected 
health information, we note that the Privacy Rule already requires 
covered entities to ensure as part of their minimum necessary policies 
and procedures that workforce members have appropriate access to 
protected health information. Therefore, covered entities should ensure 
that workforce members who gain access in an unauthorized manner to 
protected health information do not continue to have such unauthorized 
access. This may require having policies which require workforce 
members to return or destroy the information to which they obtained 
unauthorized access. Further, covered entities must implement 
reasonable safeguards to protect against impermissible uses and 
disclosures, including further impermissible uses and disclosures by a 
workforce member who has gained unauthorized access to protected health 
information.
    Comment: One commenter asked that we include an exception in the 
final rule for situations in which a laptop is lost and recovered and a 
forensic analysis shows that the protected health information on the 
computer was not accessed. The commenter stated that because the 
forensic analysis showed that the information was not compromised, a 
risk assessment should not be required.
    Response: We do not include an explicit exception for this 
particular scenario. As we explained above, in cases where a lost 
laptop is recovered, the fact that a forensic analysis of the computer 
shows that its information was not accessed is a relevant consideration 
for the risk assessment, and entities in such situations may be able to 
demonstrate a low probability that the information has been 
compromised. However, covered entities and business associates still 
must document their risk assessments in these cases. We also note, as 
we did in the interim final rule, if a computer is lost or stolen, we 
do not consider it reasonable to delay breach notification based on the 
hope that the computer will be recovered.
    Comment: Some commenters asked that we create an exception to 
breach to cover certain routine impermissible disclosures of protected 
health information. For example, commenters asked that we except from 
notification disclosures made as a result of the covered entity mailing 
information to a patient's old address, faxing information to the wrong 
number, disclosures made as a result of leaving a voice message at the 
wrong number reminding a patient of an upcoming appointment, or, in 
situations where patients have identical or similar names, contacting 
the wrong patient to inform him or her that lab results were ready.
    Response: We decline to create such an exception. The ability of a 
covered entity or business associate to demonstrate that a particular 
situation poses a low probability that the protected health information 
was compromised is very fact specific and will depend on an assessment 
of all of the factors discussed above, such as to whom the information 
was disclosed, what information was disclosed, and what mitigation has 
taken place. We also note that, in some cases, some of the situations 
contemplated by the commenters may fall within an existing exception. 
For example, if a covered entity mails protected health information 
about an individual to a wrong address, the impermissible disclosure 
may fall into the exception at paragraph (1)(iii) of the definition of 
breach if the information is returned, undelivered and unopened, to the 
covered entity, such that an unauthorized recipient could not 
reasonably have retained the information. If, however, the information 
was not returned or if the covered entity was informed by the 
unauthorized recipient that he had received and opened the mail in 
error, the covered entity would need to complete a risk assessment to 
determine the probability that the protected health information had 
been compromised as a result of the impermissible disclosure.
    Comment: Several commenters asked that we harmonize the final rule 
with the FTC's Health Breach Notification final rule.
    Response: Although the FTC and HHS breach notification rules 
generally apply to different entities, HHS has worked closely with the 
FTC to ensure both sets of regulations were harmonized to the greatest 
extent possible by including the same or similar requirements within 
the constraints of the statutory language. In addition, in the few 
situations where an entity provides PHRs to customers of a HIPAA 
covered entity through a business associate arrangement but also 
provides PHRs directly to the public and a breach of its records 
occurs, in certain cases, the FTC will deem compliance with certain 
provisions of HHS' rule as compliance with FTC's rule. See 74 FR 42964. 
In particular, in such situations, it may be appropriate for the vendor 
to provide the same breach notice to all its PHR customers since it has 
a direct relationship with all the affected individuals. Thus, in those 
limited circumstances where a vendor of PHRs (1) provides notice to 
individuals on behalf of a HIPAA covered entity, (2) has dealt directly 
with these individuals in managing their PHR accounts, and (3) provides 
notice to its customers at the same time, the FTC will deem compliance 
with HHS requirements governing the timing, method, and content of 
notice to be compliance with the corresponding FTC rule provisions. 
Note, however, that the PHR vendor still must comply with all other FTC 
rule requirements, including the requirement to notify the FTC within 
ten business days after discovering the breach.
b. Definition of ``Unsecured Protected Health Information''
Interim Final Rule
    Section 13402(h)(1)(A) of the Act defines ``unsecured protected 
health information'' as ``protected health information'' that is not 
secured through the use of a technology or methodology specified by the 
Secretary in guidance issued under [section 13402(h)(2)].'' The Act at 
section 13402(h)(2) requires that the Secretary specify in the guidance 
the technologies and methodologies that

[[Page 5647]]

render protected health information unusable, unreadable, or 
indecipherable to unauthorized individuals. Accordingly, the interim 
final rule defined ``unsecured protected health information'' as 
protected health information that is not rendered unusable, unreadable, 
or indecipherable to unauthorized individuals through the use of a 
technology or methodology specified by the Secretary in guidance. This 
guidance, which was published in updated form within the preamble to 
the interim final rule and made available on the HHS Web site, 
specifies that only encryption and destruction, consistent with 
National Institute of Standards and Technology (NIST) guidelines, 
renders protected health information unusable, unreadable, or 
indecipherable to unauthorized individuals such that notification is 
not required in the event of a breach of such information.
Overview of Public Comments
    While we received a number of technical and other comments on the 
guidance, we did not receive any comments on the language of the above 
definition itself. We intend to address the comments on the guidance in 
our next update to the guidance.
Final Rule
    The final rule modifies the interim final rule's definition of 
``unsecured protected health information'' to replace the term 
``unauthorized individuals'' in the definition with ``unauthorized 
persons.'' The term ``individual'' is defined in Sec.  160.103 to mean 
the person who is the subject of the protected health information, 
which is not what is intended with the reference to ``individual'' in 
the definition of ``unsecured protected health information.'' 
Accordingly, the final rule uses more appropriately the term 
``unauthorized persons.'' The final rule also modifies the definition 
to remove the term ``on the HHS Web site'' as unnecessary language. 
While we remove the reference to the HHS Web site from the regulatory 
text, we do plan to continue to post updates to the guidance on the Web 
site as they are issued.
2. Section 164.404--Notification to Individuals
Interim Final Rule
    Section 13402(a) of the Act provides that a covered entity that 
accesses, maintains, retains, modifies, records, stores, destroys, or 
otherwise holds, uses, or discloses unsecured protected health 
information shall, in the case of a breach of such information that is 
discovered by the covered entity, notify each affected individual whose 
unsecured protected health information has been, or is reasonably 
believed by the covered entity to have been, accessed, acquired, or 
disclosed as a result of such breach. Accordingly, Sec.  164.404(a)(1) 
of the interim final rule included the general rule that a covered 
entity shall, following the discovery of a breach of unsecured 
protected health information, notify each individual whose unsecured 
protected health information has been, or is reasonably believed to 
have been accessed, acquired, used, or disclosed as a result of such 
breach.
Breaches Treated as Discovered
    Section 13402(c) of the HITECH Act states that a breach shall be 
treated as discovered by a covered entity or business associate as of 
the first day on which such breach is known or should reasonably have 
been known to the covered entity or business associate. The Act also 
specifies that this discovery is triggered as soon as any person, other 
than the individual committing the breach, who is an employee, officer, 
or other agent of the covered entity or business associate knows or 
should reasonably have known of the breach.
    Section 164.404(a)(2) of the interim final rule implemented the 
Act's discovery provision, with respect to covered entities by stating 
that a breach shall be treated as discovered by a covered entity on the 
first day the breach is known to the covered entity, or by exercising 
reasonable diligence would have been known to the covered entity. The 
interim final rule incorporated the term ``by exercising reasonable 
diligence,'' which is used in the HIPAA Enforcement Rule and defined to 
mean the ``business care and prudence expected from a person seeking to 
satisfy a legal requirement under similar circumstances.''
    Section 164.404(a)(2) of the interim final rule further provided, 
in accordance with the Act, that a covered entity is deemed to have 
knowledge of a breach if such breach is known, or by exercising 
reasonable diligence would have been known, to any person other than 
the person committing the breach, who is a workforce member or agent of 
the covered entity. Thus, the breach is treated as discovered by the 
covered entity at the time the workforce member or other agent has 
knowledge of the breach. The rule also clarified that the federal 
common law of agency controls in determining who is an agent of the 
covered entity, which is consistent with how agency liability is 
determined under the HIPAA Rules.
Overview of Public Comments
    Several commenters argued that a breach should be treated as 
discovered by a covered entity only after management has been notified 
of the incident. Commenters stated that the Department should not hold 
an entity responsible for knowing of a breach if an appropriately 
trained employee fails to inform the proper persons within the entity 
of a breach. Other commenters asked for guidance and more clarification 
regarding what it means for a covered entity or business associate to 
be exercising reasonable diligence, such as what frequency of 
monitoring for breaches is expected or what types of systems must 
covered entities and business associates have in place to detect 
breaches.
Final Rule
    We retain Sec.  164.404(a)(2) in this final rule without 
modification. We decline to adopt the suggestion that a covered entity 
be deemed to have discovered a breach only when management is notified 
of the breach. The HITECH Act itself provides that a breach is to be 
treated as discovered by a covered entity or business associate if 
``any person, other than the individual committing the breach, that is 
an employee, officer, or other agent of such entity or associate'' 
knows or should reasonably have known of the breach. This concept is 
also consistent with the HIPAA Enforcement Rule and the Federal common 
law of agency. We encourage covered entities and business associates to 
ensure their workforce members and other agents are adequately trained 
on the importance of prompt reporting of privacy and security 
incidents.
    With respect to those commenters asking for guidance on what it 
means for a covered entity to be exercising reasonable diligence, we 
note that the term reasonable diligence, as defined in Sec.  160.401, 
means the business care and prudence expected from a person seeking to 
satisfy a legal requirement under similar circumstances. The 
determination of whether a person acted with reasonable diligence is 
generally a factual one, since what is reasonable depends on the 
circumstances. Factors to be considered include whether a covered 
entity or business associate took reasonable steps to learn of breaches 
and whether there were indications of breaches that a person seeking to 
satisfy the Rule would have investigated under similar circumstances. 
Covered entities and business associates may wish to look to how other 
covered entities and business associates operating under

[[Page 5648]]

similar circumstances conduct themselves for a standard of practice.
Timeliness
    Section 13402(d) of the Act and the implementing regulations at 
Sec.  164.404(b) require covered entities to notify individuals of a 
breach without unreasonable delay but in no case later than 60 calendar 
days from the discovery of the breach, except in certain circumstances 
where law enforcement has requested a delay. Under this rule, the time 
period for breach notification begins when the incident is first known, 
not when the investigation of the incident is complete, even if it is 
initially unclear whether the incident constitutes a breach as defined 
in the rule. A covered entity is expected to make the individual 
notifications as soon as reasonably possible after the covered entity 
takes a reasonable time to investigate the circumstances surrounding 
the breach in order to collect and develop the information required to 
be included in the notice to the individual. The 60 days is an outer 
limit and therefore, in some cases, it may be an ``unreasonable delay'' 
to wait until the 60th day to provide notification.
Overview of Public Comments
    While some commenters generally were supportive of this provision 
in the interim final rule, others argued that the 60-day timeframe for 
notification to individuals is unreasonable and requested more time, 
such as 120 days, to provide the notifications. Some commenters argued 
that the clock on the 60-day timeframe should not begin to run until 
after a covered entity has completed its investigation and determined 
that a breach has occurred. Another commenter expressed the need for 
clarification about the types of delays in notifying individuals that 
would be considered reasonable and whether a covered entity's resources 
would be taken into account in determining whether any delay was 
reasonable.
Final Rule
    We retain Sec.  164.404(b) in this final rule without modification. 
This is the standard expressly provided for in the statute and we 
otherwise do not believe it necessary or prudent to extend the 
timeframe. Covered entities and business associates have been operating 
under this timeliness standard since the issuance of the interim final 
rule and we believe a longer time period to notify individuals of 
breaches of unsecured protected health information could adversely 
impact affected individuals and the ability to mitigate adverse 
consequences. For the same reasons, we continue to provide that the 
time period begins to run when the incident becomes known, not when it 
is determined that a breach as defined by the rule has occurred. There 
is sufficient time within this standard both to conduct a prompt 
investigation of the incident and to notify affected individuals.
    With respect to what constitutes a reasonable versus unreasonable 
delay within the 60-day timeframe, such determinations are fact 
specific and there are many factors that may be relevant, including the 
nature of the breach, number of individuals affected, and resources of 
the covered entity.
Content of the Notification
    Section 13402(f) of the HITECH Act set forth the content 
requirements for the breach notice to the individual. Section 
164.404(c) of the interim final rule incorporated the statutory 
elements, requiring the following information be included in the 
notices, to the extent possible: (1) A brief description of what 
happened, including the date of the breach and the date of the 
discovery of the breach, if known; (2) a description of the types of 
unsecured protected health information that were involved in the breach 
(such as whether full name, social security number, date of birth, home 
address, account number, diagnosis, disability code, or other types of 
information were involved); (3) any steps individuals should take to 
protect themselves from potential harm resulting from the breach; (4) a 
brief description of what the covered entity involved is doing to 
investigate the breach, mitigate the harm to individuals, and to 
protect against any further breaches; and (5) contact procedures for 
individuals to ask questions or learn additional information, which 
shall include a toll-free telephone number, an email address, Web site, 
or postal address.
    The interim final rule added the term ``diagnosis,'' to the 
parenthetical listing of examples of types of protected health 
information, which was not in the statute, to make clear that, where 
appropriate, a covered entity may need to indicate in the notification 
to the individual whether and what types of treatment information were 
involved in a breach. In addition, with respect to a covered entity's 
mitigation, the interim final rule replaced the statutory term 
``mitigate losses'' with ``mitigate harm to individuals'' to make clear 
that the notification should describe the steps the covered entity is 
taking to mitigate potential harm to individuals resulting from the 
breach and that such harm is not limited to economic loss.
    To address the readability and accessibility of the notice, the 
interim final rule made a number of clarifications. First, the 
Department included in the interim final rule a requirement that the 
breach notices be written in plain language so that individuals will be 
able to understand them more easily, which means the notice should be 
written at an appropriate reading level, using clear language and 
syntax, and not include any extraneous material that might diminish the 
message it is trying to convey.
    Second, the interim final rule explained that some covered entities 
may have obligations under other laws with respect to their 
communication with affected individuals. For example, to the extent a 
covered entity is obligated to comply with Title VI of the Civil Rights 
Act of 1964, the covered entity must take reasonable steps to ensure 
meaningful access for Limited English Proficient persons to the 
services of the covered entity, which could include translating the 
notice into frequently encountered languages. Similarly, to the extent 
that a covered entity is required to comply with Section 504 of the 
Rehabilitation Act of 1973 or the Americans with Disabilities Act of 
1990, the covered entity has an obligation to take steps that may be 
necessary to ensure effective communication with individuals with 
disabilities, which could include making the notice available in 
alternate formats, such as Braille, large print, or audio.
Overview of Public Comments
    Several commenters stated that the content requirements for breach 
notification were too vague. Some commenters asked that we provide 
templates or sample notices to be used by covered entities. Other 
commenters asked for more specific guidance about particular required 
content elements of the notice, such as what information should be 
provided to individuals about a covered entity's or business 
associate's mitigation efforts and regarding any employee sanctions, 
particularly if a company has policies that require certain employment 
actions be kept confidential. It was also suggested that we publish a 
list of actions to be included in the notices based on the type of 
breach with respect to the steps individuals should take to protect 
themselves from harm. Some commenters also asked that the Department 
clarify that the requirement

[[Page 5649]]

to include ``a brief description of what happened'' would not require 
the covered entity or business associate to describe how the breach 
occurred such that it would create a roadmap for future breaches.
Final Rule
    We retain Sec.  164.404(c) in this final rule without modification. 
The content requirements in the Rule generally mirror the content 
requirements in the statute and each element is an important component 
of the notice to ensure individuals receive the information they need 
to protect themselves to the extent possible from the consequences of a 
breach and to learn what is being done to mitigate the breach and 
prevent future breaches. At the same time, the content provisions are 
sufficiently flexible to allow covered entities and business associates 
to tailor the breach notices based on the circumstances surrounding the 
breach and of the entity. In our experience in administering the Rule 
since 2009, the Rule provides sufficient flexibility to describe to the 
individual the circumstances surrounding the breach in a more general 
manner that still provides the individual with pertinent information 
but that does not provide a roadmap to third parties for future 
breaches. For example, the notice need not explain the exact type of 
vulnerability in the security of a covered entity's electronic records 
system that led to unauthorized access and how that vulnerability was 
exploited. Similarly, a covered entity has flexibility in describing 
what the covered entity is doing in response to a breach. Where 
employee sanctions are relevant based on the circumstances of the 
breach, a covered entity may determine that it wants to describe the 
sanctions imposed more generally and nothing in the Rule would require 
that the notice include the names of the employees involved. For 
example, a covered entity may want to indicate generally that the 
employees involved have been appropriately disciplined, particularly if 
multiple employees received varying levels of sanctions based on their 
degrees of involvement in the breach. In other cases, it may benefit 
the covered entity to be more specific so as to better assure 
individuals that the entity is appropriately addressing the situation, 
such as indicating that an employee who improperly accessed and sold 
patient information was promptly terminated.
    With respect to templates, examples, or other guidance, the 
Department anticipates providing additional guidance in the future.
Methods of Notification
    Section 13402(e)(1) of the HITECH Act provides for both actual 
written notice to affected individuals, as well as substitute notice to 
affected individuals if contact information is insufficient or out-of-
date. Specifically, the statute requires breach notifications to be 
sent by first-class mail at the last known address of the individual or 
next of kin if the individual is deceased, or by electronic mail if 
specified as the preferred method by the individual. The Act also 
provides that the notification may be provided in one or more mailings 
as the information becomes available. Where there is insufficient or 
out-of-date contact information that precludes direct written notice to 
the individual, the statute requires that a substitute form of notice 
be provided to the individual. If there is insufficient contact 
information for 10 or more individuals, the Act requires that the 
substitute notice be a conspicuous posting on the home page of the 
covered entity's Web site or notice in major print or broadcast media 
in the geographic areas where the affected individuals likely reside, 
and in either case, that a toll-free number be included where 
individuals can learn whether their information was possibly included 
in the breach. Finally, the Act provides that a covered entity may 
provide notice by telephone or other means to individuals, in addition 
to direct written notice by first-class mail or email, in urgent 
situations involving possible imminent misuse of the individual's 
information.
    Section 164.404(d) of the interim final rule set forth these 
methods for providing breach notification to affected individuals. 
Section 164.404(d)(1)(i) of the interim final rule required a covered 
entity to provide breach notice to an affected individual in written 
form by first-class mail at the individual's last known address. The 
interim final rule also permitted covered entities to provide this 
written notice in the form of electronic mail if the individual has 
agreed to receive electronic notice and that agreement has not been 
withdrawn.
    The Department clarified that, consistent with Sec.  164.502(g) of 
the Privacy Rule, where the individual affected by a breach is a minor 
or otherwise lacks legal capacity due to a physical or mental 
condition, notice to the parent or other person who is the personal 
representative of the individual would satisfy the requirements of 
Sec.  164.404(d)(1). Additionally, with respect to deceased 
individuals, the interim final rule at Sec.  164.404(d)(1)(ii) provided 
that notice of a breach be sent to either the individual's next of kin 
or personal representative, as such term is used for purposes of the 
Privacy Rule, recognizing that in some cases, a covered entity may have 
contact information for a personal representative of a deceased 
individual rather than the next of kin. To address administrative and 
privacy concerns with a covered entity being required to obtain contact 
information for the next of kin of a deceased patient in cases where 
the individual did not otherwise provide the information while alive, 
the interim final rule also clarified that a covered entity is only 
required to provide notice to the next of kin or personal 
representative if the covered entity both knows the individual is 
deceased and has the address of the next of kin or personal 
representative of the decedent.
    If a covered entity does not have sufficient contact information 
for some or all of the affected individuals, or if some notices are 
returned as undeliverable, the interim final rule required a covered 
entity to provide substitute notice for the unreachable individuals in 
accordance with Sec.  164.404(d)(2). The interim final rule required 
that substitute notice be provided as soon as reasonably possible after 
the covered entity is aware that it has insufficient or out-of-date 
contact information for one or more affected individuals and that the 
notice contain all the elements that Sec.  164.404(c) requires be 
included in the direct written notice to individuals. With respect to 
decedents, however, the interim final rule provided that a covered 
entity is not required to provide substitute notice for the next of kin 
or personal representative in cases where the covered entity either 
does not have contact information or has out-of-date contact 
information for the next of kin or personal representative.
    Section 164.404(d)(2) of the interim final rule required that, 
whatever method used, the substitute form of notice be reasonably 
calculated to reach the individuals for whom it is being provided. If 
there are fewer than 10 individuals for whom the covered entity has 
insufficient or out-of-date contact information to provide the written 
notice, Sec.  164.404(d)(2)(i) of the interim final rule permitted the 
covered entity to provide substitute notice to such individuals through 
an alternative form of written notice, by telephone, or other means. 
For example, if a covered entity learned that the home address it has 
for one of its patients was out-of-date, but it had the patient's email 
address or telephone number, it could provide

[[Page 5650]]

substitute notice by email (even if the patient had not agreed to 
electronic notice) or by phone. Alternatively, posting a notice on the 
Web site of the covered entity or at another location may be 
appropriate if the covered entity lacks any current contact information 
for the patients, so long as the posting is done in a manner that is 
reasonably calculated to reach the individuals.
    If a covered entity has insufficient or out-of-date contact 
information for 10 or more individuals, then Sec.  164.404(d)(2)(ii) of 
the interim final rule required the covered entity to provide 
substitute notice through either a conspicuous posting for a period of 
90 days on the home page of its Web site or conspicuous notice in major 
print or broadcast media in geographic areas where the individuals 
affected by the breach likely reside. For either method involving 10 or 
more individuals, the covered entity was also required to have a toll-
free phone number, active for 90 days, where an individual can learn 
whether the individual's unsecured protected health information may be 
included in the breach and to include the number in the notice.
    If a covered entity chooses to provide substitute notice on its Web 
site, the covered entity may provide all the information described at 
Sec.  164.404(c) directly on its home page (``home page'' includes the 
home page for visitors to the covered entity's Web site and the landing 
page or login page for existing account holders) or may provide a 
prominent hyperlink on its home page to the notice containing such 
information.
    If the covered entity does not have or does not wish to use a Web 
site for the substitute notice, the interim final rule required the 
covered entity to provide substitute notice of the breach in major 
print or broadcast media in geographic areas where the individuals 
affected by the breach likely reside. What is considered major print or 
broadcast media for a metropolitan area may be very different from what 
is considered major print or broadcast media in a rural area, such that 
the use of local, city, or state-wide media may be appropriate 
depending on the circumstances. Further, multiple media outlets may 
need to be utilized to reasonably reach individuals in different 
regions or States. In any event, substitute media notice, as with 
substitute Web notice, must be conspicuous and thus, covered entities 
should consider the location and duration of the notice to ensure the 
notice is reasonably calculated to reach the affected individuals.
    Finally, we clarified that covered entities with out-of-date or 
insufficient contact information for some individuals can attempt to 
update the contact information so that they can provide direct written 
notification, in order to limit the number of individuals for whom 
substitute notice is required and, thus, potentially avoid the 
obligation to provide substitute notice through a Web site or major 
print or broadcast media under Sec.  164.404(d)(2)(ii).
    In accordance with the statute, Sec.  164.404(d)(3) makes clear 
that notice to the individual by telephone or other means may be 
provided, in addition to the direct written notice required by Sec.  
164.404(d)(1), in cases deemed by the covered entity to require urgency 
because of possible imminent misuse of unsecured protected health 
information.
Overview of Public Comments
    Several commenters questioned which entity has the responsibility 
for providing notifications to individuals when a breach occurs at or 
by a business associate and whether a covered entity could delegate its 
breach notification obligations to a business associate. Some 
commenters asked about the notification obligations in cases where a 
covered entity's business associate that experiences a breach is also a 
covered entity itself. Others requested clarification regarding the 
obligations for providing breach notification where multiple covered 
entities and business associates are involved in health information 
exchange and it may be unclear where a breach occurred and/or which 
entity has responsibility for the breach.
    Additionally, many commenters suggested that covered entities be 
permitted to provide notification to individuals via telephone or 
orally instead of via written communication, or at a work address 
instead of a home address, if the individual has specified one of these 
alternative methods or locations as preferred for receiving breach 
notification. Commenters raised potential privacy concerns with 
communicating with individuals via mail to their home, particularly 
where the individual has received highly confidential medical services, 
such as substance abuse or mental health services, and others who may 
have access to the mail may not otherwise be aware of such condition or 
treatment. Some commenters argued that because the Privacy Rule 
requires covered entities to accommodate reasonable requests by 
individuals to receive communications by alternative means or at 
alternative locations, the same standard should apply to the provision 
of breach notification.
    Finally, several commenters expressed concern over the substitute 
notice required in cases in which the covered entity has insufficient 
or out-of-date contact information for affected individuals. Many of 
these commenters stated that providing notification via Web posting or 
media publication is an inappropriate method of providing substitute 
notice, except in cases in which the covered entity can reasonably 
define the universe of affected individuals. In other cases, such 
notice will not give individuals who view the notice enough information 
to determine if they are affected by a breach, and may cause unaffected 
individuals unnecessary alarm. Some commenters recommended that covered 
entities instead be required to use reasonable efforts to identify 
alternative means of providing direct notice to the affected 
individuals, such as by phone or email, or to only require substitute 
media or Web notice when a covered entity cannot reach 10 or more 
individuals directly by mail, phone, or email. Other commenters argued 
that the substitute notice requirements, particularly the requirement 
to establish a toll-free number, may be cost prohibitive to smaller 
covered entities. It was also suggested that smaller covered entities, 
particularly those in rural areas, should be allowed to provide 
substitute notice via handouts or postings at the covered entity's 
physical location even in cases where the entity has insufficient 
contact information for more than 10 individuals.
Final Rule
    We retain Sec.  164.404(d) in this final rule without modification. 
In response to questions raised with respect to a breach at or by a 
business associate, we note that the covered entity ultimately 
maintains the obligation to notify affected individuals of the breach 
under Sec.  164.404, although a covered entity is free to delegate the 
responsibility to the business associate that suffered the breach or to 
another of its business associates. This is the case even if the breach 
of the covered entity's protected health information occurred at or by 
a business associate that is also a covered entity. For example, if a 
covered provider (Provider A) hires another covered provider's practice 
(Provider B) as a business associate to perform his billing and other 
back office functions, and a breach of Provider A's protected health 
information occurs at Provider B while performing these functions for 
Provider A, it remains Provider A's responsibility to provide breach 
notification to the affected individuals, although Provider A may 
delegate this

[[Page 5651]]

responsibility to Provider B as its business associate.
    Covered entities and business associates should consider which 
entity is in the best position to provide notice to the individual, 
which may depend on various circumstances, such as the functions the 
business associate performs on behalf of the covered entity and which 
entity has the relationship with the individual.
    Similarly, when multiple covered entities participate in electronic 
health information exchange and there is a breach of unsecured 
protected health information at a Health Information Organization 
(HIO), the obligation to notify individuals of the breach falls to the 
covered entities. We recognize that it may be difficult to determine 
what breached information is attributable to which covered entity's 
individuals. For example, an HIO may store centralized electronic 
health records (EHRs) for a community, with each EHR including 
information generated by multiple covered entities. In such 
circumstances, it may be necessary for the HIO to notify all 
potentially affected covered entities and for those covered entities to 
delegate to the HIO the responsibility of sending the required 
notifications to the affected individuals. This would avoid the 
confusion of individuals receiving more than one notification about the 
same breach.
    In response to the commenters who suggested that covered entities 
be permitted to accommodate reasonable requests by individuals to 
receive breach notifications by alternative means or at alternative 
locations, we provide the following guidance. The HITECH Act requires a 
covered entity to provide breach notification to an affected individual 
in written form either at the last known address of the individual or 
email address, if the individual agrees to receive notice 
electronically, where the covered entity has sufficient contact 
information to do so. The Act and this rule do not prohibit a covered 
entity from sending a breach notice to an alternative address rather 
than a home address, such as a work address or post office box, or the 
individual's email address of choice, if the individual requests 
communications be sent to such an address. Further, a covered health 
care provider (and health plan, if potential endangerment is raised by 
the individual) is required by the Privacy Rule at Sec.  164.522 to 
accommodate any such reasonable requests.
    In response to those commenters who urged that we allow breach 
notices to be provided orally or via telephone to individuals receiving 
highly confidential treatment services where the individual has 
requested to receive communications in such a manner, we note that the 
HITECH Act specifically refers to ``written'' notice to be provided to 
individuals. However, we understand the privacy concerns raised. We, 
thus, clarify that in the limited circumstances in which an individual 
has agreed only to receive communications from a covered health care 
provider orally or by telephone, the provider is permitted under the 
Rule to telephone the individual to request and have the individual 
pick up their written breach notice from the provider directly. In 
cases in which the individual does not agree or wish to travel to the 
provider to pick up the written breach notice, the health care provider 
should provide all of the information in the breach notice over the 
phone to the individual, document that it has done so, and the 
Department will exercise enforcement discretion in such cases with 
respect to the ``written notice'' requirement. We stress that our 
enforcement discretion applies only to cases where the individual 
affirmatively chooses not to receive communications from a covered 
health care provider at any written addresses or email addresses, and 
not to situations where providing telephonic notice is simply less 
burdensome or easier on a provider and the entity has a valid address, 
or email address if applicable, on file for the affected individual.
    Finally, with respect to commenters who expressed concerns with the 
substitute media and Web notice provisions of the interim final rule, 
we emphasize that these are statutory requirements that have been 
incorporated into the Rule. Section 13402(e)(1)(B) of the HITECH Act 
expressly requires that a covered entity that has insufficient or out-
of-date contact information for 10 or more individuals provide 
substitute notification to such individuals via posting on their Web 
site or notification in major print or broadcast media in the areas in 
which the affected individuals likely reside. Additionally, the statute 
requires such ``notice in media or web posting will include a toll-free 
phone number where an individual can learn whether or not the 
individual's unsecured protected health information is possibly 
included in the breach.'' Thus, we retain these requirements in this 
final rule.
Response to Other Public Comments
    Comment: One commenter expressed concern about providing breach 
notification to individuals by first-class mail because it could 
require some entities, such as those that have Web-based relationships 
with individuals, to collect more information about individuals (e.g., 
physical addresses) than they currently do.
    Response: The Rule allows a covered entity to provide written 
breach notice to an affected individual by email if the individual 
agrees to electronic notice and such agreement has not been withdrawn. 
We would expect that covered entities that have primarily or solely an 
online relationship with individuals would ask and encourage 
individuals to receive breach notices by email and that generally 
individuals would agree. However, an individual that does not 
affirmatively agree to receive breach notices by email, or that 
withdraws a prior agreement, has a right to notice by first-class mail.
    Comment: One commenter suggested that we excuse a covered entity 
from providing notification of a breach to an individual where a 
licensed health care professional has determined in the exercise of 
professional judgment that the provision of such notice is likely to 
cause substantial harm to the individual. The commenter appeared to be 
concerned due to the nature of the services it provides--mental health 
services--and the distress breach notification could cause for certain 
of its patients.
    Response: The statute does not include such an exception to the 
provision of breach notification, and we do not include one in this 
Rule. An affected individual has a right to be informed of breaches of 
unsecured protected health information so the individual can take steps 
if appropriate to protect themselves from the consequences. In 
situations where a health care provider believes that the provision of 
written breach notification to an individual may cause extreme anguish 
or distress, based on the individual's mental state or other 
circumstances, the provider may telephone the individual prior to the 
time the breach notice is mailed or have them come into the provider's 
office to discuss the situation. However, we note that the breach 
notification must still be mailed without unreasonable delay and in no 
case later than 60 calendar days after discovery of the breach. Where a 
provider is aware that an individual has a personal representative due 
to incapacity or other health condition, the breach notification may be 
sent to the personal representative.
    Comment: Many commenters expressed support for allowing covered 
entities to provide breach notification to a deceased individual's 
personal representative instead of to the next of

[[Page 5652]]

kin. One commenter suggested that we also allow covered entities to 
provide breach notification to the emergency contact provided by a 
deceased individual prior to death as this is the information they 
collect from individuals and yet this person may not be the next of kin 
or a personal representative of the deceased individual.
    Response: We do not believe it appropriate to permit covered 
entities to send breach notifications to a deceased individual's 
emergency contact where such person is not a personal representative 
(such as an executor or administrator of the decedent's estate) or next 
of kin of the decedent, as such notices may convey information about 
the decedent's care the decedent never wished the emergency contact to 
have and/or may go to a person who has no authority to act on the 
notice.
    Comment: To reduce the costs associated with sending breach 
notifications, one commenter asked that we adopt the Department of 
Labor's standard for providing COBRA Election Notices to allow a 
covered entity to: (1) Where a breach affects both a plan participant 
and the participant's spouse, send one breach notice addressed to both 
if both spouses reside at the same address; and (2) where a breach 
affects a dependent child (of any age) under a plan, send a breach 
notice to either the plan participant and/or the participant's spouse, 
provided the dependent child resides at the same address. The commenter 
stated the notice should clearly identify the individuals or classes of 
individuals to whom the notice applies.
    Response: A covered entity is permitted to send one breach notice 
addressed to both a plan participant and the participant's spouse or 
other dependents under the plan who are affected by a breach, so long 
as they all reside at a single address and the covered entity clearly 
identifies on the notice the individuals to which the notice applies. 
Further, a covered entity may send a notice regarding the breach of a 
dependent child's protected health information addressed to the plan 
participant and/or participant's spouse living with the dependent 
child, so long as the participant and/or participant's spouse are the 
personal representatives of the dependent child and the notice clearly 
identifies to whom it applies. Such notices by first-class mail would 
meet the written notice requirements of Sec.  164.404(d)(1)(i). 
However, one breach notice covering both the plan participant and the 
dependents under the plan mailed to the plan participant's address 
would not suffice if the address of one or more dependents affected by 
the breach was different than the participant's address. Further, where 
a plan participant (and/or spouse) is not the personal representative 
of a dependent under the plan, a covered entity must address a breach 
notice to the dependent himself or herself.
    Comment: Several commenters expressed support for the 
acknowledgment in the preamble to the interim final rule that some 
covered entities may have obligations under Civil Rights laws to ensure 
that breach notifications are provided to individuals in alternative 
languages, and in alternative formats, such as Braille, large print, or 
audio, where appropriate. Some commenters requested additional guidance 
regarding how to ensure compliance with these laws with respect to 
breach notifications.
    Response: Additional guidance on how to comply with Title VI of the 
Civil Rights Act of 1964, Section 504 of the Rehabilitation Act of 
1973, and the Americans with Disabilities Act of 1990, is available on 
the OCR Web site at https://www.hhs.gov/ocr/civilrights/. Further, 
covered entities with questions on how to comply may contact one of 
OCR's ten regional offices. Contact information is available at https://www.hhs.gov/ocr/office/about/rgn-hqaddresses.html.
    Comment: Some commenters suggested that the final rule adopt a 
substitute notification provision similar to that in many State laws 
that allows for substitute notification, rather than direct written 
notice, to the individual in the event of breaches affecting a very 
large number of individuals, such as over 250,000 or 500,000, where the 
costs of notification would be extremely high.
    Response: The Act does not waive direct written notice to the 
individual when a breach has affected a threshold number of individuals 
and we do not do so in this rule.
    Comment: One commenter requested confirmation that a covered entity 
could make multiple attempts to provide direct written notice to 
individuals within the 60-day timeframe before the individual counts 
towards the 10 or more threshold for providing substitute Web or media 
notice.
    Response: We clarify that a covered entity can attempt to cure out-
of-date contact information on individuals when notices are returned as 
undeliverable by the United States Postal Service to avoid substitute 
notice so long as a covered entity does so promptly upon receiving the 
returned notices and no later than 60 calendar days from discovery of 
the breach. However, at the time the covered entity is aware that it 
will be unable to reach 10 or more individuals with direct written 
notice, the covered entity should provide substitute Web or media 
notice as soon as reasonably possible thereafter, which may be prior to 
the end of the 60-day period depending on the circumstances.
    Comment: One commenter stated that the required content of the 
breach notice itself, when made available to the public through the Web 
or media, could lead to the identification of individuals affected by 
the breach in some cases, undermining the intent of HIPAA's privacy and 
security protections.
    Response: It is unclear the circumstances to which the commenter 
refers. For example, the notification must include the types of 
protected health information involved (e.g., social security numbers, 
dates of birth, full names). However, this is not a requirement to 
include in the notice the actual names or other identifiers of the 
affected individuals. We believe covered entities are able to post 
breach notices in a manner that does not identify particular 
individuals affected by a breach and thus, must do so.
    Comment: One commenter asked that OCR engage in an educational 
campaign to ensure that covered entities and business associates 
understand their obligations under the breach notification rule.
    Response: Published guidance is the primary method that the 
Department uses to educate and provide technical assistance to covered 
entities and business associates. We intend to issue guidance on these 
requirements in the future as questions are raised or clarifications 
sought.
3. Section 164.406--Notification to the Media
    Section 13402(e)(2) of the HITECH Act, implemented at Sec.  164.406 
of the interim final rule, requires that a covered entity provide 
notice of a breach to prominent media outlets serving a State or 
jurisdiction, following the discovery of a breach if the unsecured 
protected health information of more than 500 residents of such State 
or jurisdiction is, or is reasonably believed to have been, accessed, 
acquired, or disclosed during such breach. This media notice is in 
addition to, not a substitute for, individual notice. In accordance 
with the Act, Sec.  164.406(b) of the interim final rule required 
covered entities to notify prominent media outlets without unreasonable 
delay and in no case later than 60 calendar days after discovery of the 
breach. Section 164.406(c) of the interim final rule required that the

[[Page 5653]]

notification to the media include the same information required to be 
included in the notification to the individual under Sec.  164.404(c).
    The interim final rule did not define ``prominent media outlet'' 
because what constitutes a prominent media outlet will differ depending 
upon the State or jurisdiction affected. For a breach affecting more 
than 500 individuals across a particular state, a prominent media 
outlet may be a major, general interest newspaper with a daily 
circulation throughout the entire state. In contrast, a newspaper 
serving only one town and distributed on a monthly basis, or a daily 
newspaper of specialized interest (such as sports or politics) would 
not be viewed as a prominent media outlet. Where a breach affects more 
than 500 individuals in a limited jurisdiction, such as a city, then a 
prominent media outlet may be a major, general-interest newspaper with 
daily circulation throughout the city, even though the newspaper does 
not serve the whole State.
    With regard to the term ``State,'' the existing definition of 
``State'' at Sec.  160.103 of the HIPAA Rules applies. Section Sec.  
160.103 defines ``State'' to mean ``any one of the several States, the 
District of Columbia, the Commonwealth of Puerto Rico, the Virgin 
Islands, and Guam.'' We also expressly provided in the regulation that 
``State'' for purposes of notice to the media includes American Samoa 
and the Northern Mariana Islands, because they were included in the 
HITECH Act's definition of ``State'' in addition to what appears in the 
definition at Sec.  160.103. With respect to what was meant by 
``jurisdiction'' as opposed to a ``State,'' jurisdiction is a 
geographic area smaller than a state, such as a county, city, or town.
    The interim final rule also clarified that some breaches involving 
more than 500 individuals who are residents in multiple States may not 
require notice to the media. For example, if a covered entity discovers 
a breach of 600 individuals, 200 of which reside in Virginia, 200 of 
which reside in Maryland, and 200 of which reside in the District of 
Columbia, the breach did not affect more than 500 residents of any one 
State or jurisdiction, and as such, notification is not required to be 
provided to the media pursuant to Sec.  164.406. However, individual 
notification under Sec.  164.404 would be required, as would 
notification to the Secretary under Sec.  164.408 because the breach 
involved 500 or more individuals.
    The Department also recognized that in some cases a breach may 
occur at a business associate and involve the protected health 
information of multiple covered entities. In such cases, a covered 
entity involved would only be required to provide notification to the 
media if the information breached included the protected health 
information of more than 500 individuals located in any one State or 
jurisdiction. For example, if a business associate discovers a breach 
affecting 800 individuals in a State, the business associate must 
notify the appropriate covered entity (or covered entities) subject to 
Sec.  164.410 (discussed below). If 450 of the affected individuals are 
patients of one covered entity and the remaining 350 are patients of 
another covered entity, because the breach has not affected more than 
500 individuals at either covered entity, there is no obligation to 
provide notification to the media under this section.
    Section 164.406(c) requires that the notice to the media include 
the same content as that required for notification to the individual 
under Sec.  164.404(c), and we emphasized that this provision does not 
replace either direct written or substitute notice to the individual 
under Sec.  164.404.
Overview of Public Comments
    In general, we received few comments on this provision of the 
interim final rule. One commenter expressed general support for this 
provision because it does not require the covered entity to incur the 
cost of printing or running the media notice and asked for 
clarification that this policy places no requirement on the media to 
publically report the information provided by a covered entity. Another 
commenter asked whether a covered entity could fulfill the requirements 
for providing media notification by posting a press release on the 
covered entity's Web site.
Final Rule
    We retain Sec.  164.406 in this final rule with one minor change. 
As described in Section IV above, to align the definition of ``State'' 
in the HIPAA Rules with the definition of the same term used in the 
HITECH Act, the Department has modified the definition of ``State'' at 
Sec.  160.103 to include reference to American Samoa and the Northern 
Mariana Islands. Given this change, it is not necessary to include 
specific reference to American Samoa and the Northern Mariana Islands 
at Sec.  164.406 and we remove it in this final rule.
    In response to public comments, we clarify that Sec.  164.406 does 
not require a covered entity to incur any cost to print or run media 
notice about a breach of unsecured protected health information (unlike 
the obligations for providing substitute notice to individuals in Sec.  
164.404(d)(2) if there is insufficient or out-of-date contact 
information for 10 or more affected individuals) nor does it obligate 
prominent media outlets who receive notification of a breach from a 
covered entity to print or run information about the breach. We also 
emphasize that posting a press release regarding a breach of unsecured 
protected health information on the home page of the covered entity's 
Web site will not fulfill the obligation to provide notice to the media 
(although covered entities are free to post a press release regarding a 
breach on their Web site). To fulfill the obligation, notification, 
which may be in the form of a press release, must be provided directly 
to prominent media outlets serving the State or jurisdiction where the 
affected individuals reside.
4. Section 164.408--Notification to the Secretary
    Section 13402(e)(3) of the HITECH Act requires covered entities to 
notify the Secretary of breaches of unsecured protected health 
information. The Act requires covered entities to report breaches 
affecting 500 or more individuals to the Secretary immediately. For 
breaches affecting fewer than 500 individuals, covered entities may 
maintain a log of all such breaches occurring during the year and 
annually submit such log to the Secretary.
    To implement the statutory provisions, Sec.  164.408(a) contains 
the general rule that requires a covered entity to notify the Secretary 
following the discovery of a breach of unsecured protected health 
information. With respect to breaches involving 500 or more 
individuals, we interpreted the term ``immediately'' in the statute to 
require notification be sent to the Secretary concurrently with the 
notification sent to the individual under Sec.  164.404 (i.e., without 
unreasonable delay but in no case later than 60 calendar days following 
discovery of a breach). The rule provided that these notifications be 
provided in a manner to be specified on the HHS Web site. Further, as 
required by section 13402(e)(4) of the Act, the interim final rule 
stated that the Secretary would begin to post and maintain on the HHS 
Web site a list of covered entities that submit reports of breaches of 
unsecured protected health information involving more than 500 
individuals.
    Under these provisions, covered entities must notify the Secretary 
of all discovered breaches involving more than 500 individuals, without 
regard to

[[Page 5654]]

whether the breach involved more than 500 residents of a particular 
State or jurisdiction (the threshold for triggering notification to the 
media under Sec.  164.406 of the interim final rule). Thus, where a 
covered entity has discovered a breach involving 600 individuals, 300 
of which reside in Maryland and 300 of which reside in the District of 
Columbia, notification of the breach must be provided to the Secretary 
concurrently with notification to the affected individuals. However, in 
this example, the breach would not trigger the requirement to notify 
the media under Sec.  164.406 because the breach did not involve more 
than 500 residents of any one State or jurisdiction.
    For breaches involving less than 500 individuals, Sec.  164.408(c) 
requires a covered entity to maintain a log or other documentation of 
such breaches and to submit information annually to the Secretary for 
breaches occurring during the preceding calendar year. The interim 
final rule required the submission of this information to the Secretary 
no later than 60 days after the end of each calendar year. As with 
notification of the larger breaches, the interim final rule required 
that information about breaches involving less than 500 individuals be 
provided to the Secretary in the manner specified on the HHS Web site.
    Although covered entities need only provide notification to the 
Secretary of breaches involving less than 500 individuals annually, 
they must still provide notification of such breaches to affected 
individuals without unreasonable delay and not later than 60 days after 
discovery of the breach pursuant to Sec.  164.404. In addition, 
pursuant to Sec.  164.414(a), a covered entity must follow the 
documentation requirements that otherwise apply to the HIPAA Privacy 
Rule under Sec.  164.530 with respect to the requirements of this rule. 
Thus, pursuant to Sec.  164.530(j)(2), covered entities must maintain 
the internal log or other documentation for six years. Further, as with 
other required documentation, a covered entity must make such 
information available to the Secretary upon request for compliance and 
enforcement purposes in accordance with Sec.  160.310.
Overview of Public Comments
    Some commenters expressed concern regarding the timing of providing 
notification to the Secretary of breaches affecting fewer than 500 
individuals. These commenters asked when notification should be 
provided if a covered entity discovers, after the reporting deadline, a 
breach that occurred in the previous year. Several others commented on 
the interim final rule's process for providing the Secretary with 
breach notification. Some commenters asked that this process be revised 
to allow covered entities to maintain a log of all breaches affecting 
fewer than 500 individuals and then submit that log, via attachment 
(such as an Excel spreadsheet), to the Secretary on an annual basis. 
These commenters stated that submitting reports of these smaller 
breaches in this manner would be much less burdensome than submitting 
the reports individually. Other commenters asked that we provide a 
template log for entities to use to document smaller breaches for 
annual submission to the Secretary. Additionally, several commenters 
suggested that there be access or authentication controls for 
submitting breach reports because of concerns of false breach reports 
being submitted to the Secretary without the covered entity's 
knowledge.
Final Rule
    The final rule retains Sec.  164.408(c) with one modification. The 
modification clarifies that covered entities are required to notify the 
Secretary of all breaches of unsecured protected health information 
affecting fewer than 500 individuals not later than 60 days after the 
end of the calendar year in which the breaches were ``discovered,'' not 
in which the breaches ``occurred.'' We recognize that there may be 
situations where, despite having reasonable and appropriate breach 
detection systems in place, a breach may go undetected for some time. 
In these cases, if a breach of unsecured protected health information 
affecting fewer than 500 individuals that occurred in the previous year 
is discovered, the covered entity has until 60 days after the end of 
the calendar year in which the breach was discovered to provide notice 
to the Secretary. We emphasize, however, that this modification does 
not alter a covered entity's obligation to promptly report the breach 
to affected individuals without unreasonable delay but in no cases 
later than 60 calendar days after discovery of the breach.
    In response to the comments suggesting that covered entities be 
permitted to submit a log of all smaller breaches to the Secretary 
instead of submitting each breach individually through the online form, 
we agree that the current process may be burdensome for some entities 
and are considering alternative ways to receive such reports.
    With respect to the commenters who asked that access or 
authentication controls be added to the breach reporting form, we do 
not believe this is necessary at the present time. Since the Department 
began receiving and processing breach reports on September 23, 2009, we 
have not yet received a report that has been falsely submitted by an 
individual or entity not acting on behalf of the covered entity. 
Additionally, we emphasize that following receipt of a breach report 
that affects 500 or more individuals, we contact the covered entity 
identified in the breach report and verify the information in the 
report before we post any information about the breach on the HHS Web 
site. If circumstances change in the future, we will explore options 
for modifying the process.
Response to Other Public Comments
    Comment: One commenter asked that the final rule should not 
interpret the term ``immediately'' in the statute to mean without 
unreasonable delay, but in no case later than 60 days, but rather to 
mean as soon as the breach is discovered. Another commenter asked that 
the final rule expand the timeframe for providing notification to the 
Secretary to no later than 120 days after discovery of a breach.
    Response: We believe that our interpretation of ``immediately'' 
with respect to notification to the Secretary for breaches affecting 
500 or more individuals is reasonable and appropriate and thus, retain 
the provision that requires such notice be provided contemporaneously 
with notice to the individual. Requiring contemporaneous notice allows 
the notice to the Secretary to include all of the information provided 
in the notice to the individual and better ensures that a covered 
entity does not report information to the Secretary that later turns 
out to be incorrect because the entity did not have sufficient time to 
conduct an investigation into the facts surrounding the breach. In 
addition, this interpretation satisfies the statutory requirement that 
notifications of larger breaches be provided to the Secretary 
immediately (as they occur) as compared to the reports of smaller 
breaches the statute allows be reported annually to the Secretary.
    Comment: Some commenters asked for further guidance on submitting 
online breach notifications to the Secretary. Additionally, some 
commenters asked that HHS provide a confirmation to submitters that an 
initial breach report or an addendum to a breach report has been 
successfully submitted.
    Response: Since the publication of the interim final rule, OCR has 
posted

[[Page 5655]]

instructions for filling out and submitting the breach form on its Web 
site: https://www.hhs.gov/ocr/privacy/hipaa/administrative/breachnotificationrule/brinstruction.html. We will continue to examine 
the instructions for submitting breach notification to the Secretary 
and will update this information, as necessary, to ensure that covered 
entities are able to navigate and submit the form easily. The 
Department has also made changes to the process to ensure that covered 
entities receive a confirmation following their submission of breach 
notification to the Secretary. Additionally, we note that the breach 
reporting form does include an option for indicating that a submission 
is an addendum to a previous submission. OCR updates the original 
breach report, as appropriate, with any additional or modified 
information submitted in an addendum.
    Comment: With respect to the posting of breaches affecting 500 or 
more individuals on the HHS Web site, some commenters stated that these 
breach submissions must be verified with the covered entity before they 
are posted publicly. Other commenters asked for clarification of what 
information will be posted, while another commenter asked that we post 
only the name of the covered entity involved in the breach. Finally, 
one commenter suggested that we only post these breaches on our Web 
site for a six month period.
    Response: To provide helpful information to the public, OCR 
currently posts the following information regarding breaches affecting 
500 or more individuals: name of the covered entity (and if applicable, 
the business associate) involved; State where the covered entity is 
located; number of individuals affected by the breach; the date of the 
breach; type of breach (e.g., theft, loss, unauthorized access/
disclosure); and location of the breached information (e.g., laptop, 
paper records, desktop computer). Prior to posting this information, 
OCR verifies the information in the breach notification report with the 
covered entity. We do not believe it would serve the public to only 
disclose the name of the covered entity involved in each of the 
breaches, because the additional information enables members of the 
public to understand the nature of the breach and to determine if the 
breach affects them directly. In terms of how long information about 
each of the breaches is to remain posted, we intend to maintain the 
information on our Web site for as long as there is public interest and 
the data can remain posted in a manner that gives the public access 
effectively and efficiently.
5. Section 164.410--Notification by a Business Associate
Interim Final Rule
    Section 13402(b) of the HITECH Act requires a business associate of 
a covered entity that accesses, maintains, retains, modifies, records, 
destroys, or otherwise holds, uses, or discloses unsecured protected 
health information to notify the covered entity when it discovers a 
breach of such information. The Act requires business associates to 
provide such notification to covered entities without unreasonable 
delay and in no case later than 60 days from discovery of the breach. 
Additionally, the Act requires business associates to provide covered 
entities with the identity of each individual whose unsecured protected 
health information has, or is reasonably believed to have been, 
affected by the breach. Section 164.410(a) implements section 13402(b) 
of the Act.
    A business associate is required to notify the covered entity of 
the breach of unsecured protected health information so that the 
covered entity can notify affected individuals. In the interim final 
rule, we clarified that a business associate that maintains the 
protected health information of multiple covered entities need notify 
only the covered entity(s) to which the breached information relates. 
However, in cases in which a breach involves the unsecured protected 
health information of multiple covered entities and it is unclear to 
whom the breached information relates, it may be necessary to notify 
all potentially affected covered entities.
    Section 164.410(a)(2) provides that a breach shall be treated as 
discovered by a business associate as of the first day on which such 
breach is known to the business associate or, by exercising reasonable 
diligence, would have been known to the business associate. As with a 
covered entity, a business associate shall be deemed to have knowledge 
of a breach if the breach is known, or by exercising reasonable 
diligence would have been known, to any person, other than the person 
committing the breach, who is an employee, officer, or other agent of 
the business associate (determined in accordance with the Federal 
common law of agency). Similarly, as with knowledge imputed to covered 
entities, the Federal common law of agency controls in determining who 
is an agent of the business associate.
    Section 164.410(b) requires that a business associate provide 
notice of a breach of unsecured protected health information to a 
covered entity without unreasonable delay and in no case later than 60 
days following the discovery of a breach. With respect to timing, if a 
business associate is acting as an agent of a covered entity, then, 
pursuant to Sec.  164.404(a)(2), the business associate's discovery of 
the breach will be imputed to the covered entity. In such 
circumstances, the covered entity must provide notifications under 
Sec.  164.404(a) based on the time the business associate discovers the 
breach, not from the time the business associate notifies the covered 
entity. In contrast, if the business associate is not an agent of the 
covered entity, then the covered entity is required to provide 
notification based on the time the business associate notifies the 
covered entity of the breach. We encouraged covered entities and 
business associates to address the timing of this notification in their 
business associate contracts.
    Section 164.410(c)(1) requires business associates, to the extent 
possible, to provide covered entities with the identity of each 
individual whose unsecured protected health information has been, or is 
reasonably believed to have been, breached. Depending on the 
circumstances, business associates could provide the covered entity 
with immediate notification of the breach and then follow up with the 
required information in Sec.  164.410(c) when available but without 
unreasonable delay and within 60 days.
    Section 164.410(c)(1) requires business associates to provide this 
information ``to the extent possible,'' recognizing that there may be 
situations in which a business associate may be unaware of the 
identification of the individuals whose unsecured protected health 
information was breached. For example, a business associate that is a 
record storage company that holds hundreds of boxes of paper medical 
records on behalf of a covered entity may be unaware of the names of 
the individuals whose records are stored. Thus, if the business 
associate discovers that several boxes are missing, it may be unable to 
provide the covered entity with a list of the individuals whose 
information has been breached. In such circumstances, it is not our 
intent that the business associate delay notification of the breach to 
the covered entity, when the covered entity may be better able to 
identify the individuals affected.
    Depending on the circumstances surrounding a breach of unsecured 
protected health information, a business

[[Page 5656]]

associate may be in the best position to gather the information the 
covered entity is required by Sec.  164.404(c) to include in the 
notification to the individual about the breach. Therefore, in addition 
to the identification of affected individuals, Sec.  164.410(c)(2) 
requires a business associate to provide the covered entity with any 
other available information that the covered entity is required to 
include in the notification to the individual under Sec.  164.404(c), 
either at the time it provides notice to the covered entity of the 
breach or promptly thereafter as information becomes available. Because 
we allow this information to be provided to a covered entity after the 
initial notification of the breach as it becomes available, a business 
associate should not delay the initial notification to the covered 
entity of the breach in order to collect information needed for the 
notification to the individual. To ensure the covered entity is aware 
of all the available facts surrounding a breach, the Rule also requires 
that a business associate provide this information even if it becomes 
available after notifications have been sent to affected individuals or 
after the 60-day period specified in Sec.  164.410(b) has elapsed.
    We clarified that business associates and covered entities would 
continue to have the flexibility to set forth specific obligations for 
each party, such as who will provide notice to individuals and when the 
notification from the business associate to the covered entity will be 
required, following a breach of unsecured protected health information, 
so long as all required notifications are provided and the other 
requirements of the interim final rule were met. We encouraged the 
parties to consider which entity is in the best position to provide 
notice to the individual, which may depend on circumstances, such as 
the functions the business associate performs on behalf of the covered 
entity and which entity has the relationship with the individual. We 
also encouraged the parties to ensure the individual does not receive 
notifications from both the covered entity and the business associate 
about the same breach, which may be confusing to the individual.
Overview of Public Comments
    Many commenters expressed concern over the interim final rule's 
treatment of a covered entity's knowledge of a breach that occurs at or 
by a business associate. Some commenters stated that a covered entity's 
knowledge of a breach should begin when the business associate notifies 
them of the breach, regardless of whether the business associate is an 
agent of the covered entity or a non-agent independent contractor. If 
knowledge is imputed when the business associate discovers the breach, 
one commenter argued that a covered entity would not have sufficient 
time to provide the required notifications to individuals in a timely 
manner. Other commenters argued that all business associates should be 
treated as agents of the covered entity, such that the business 
associate's knowledge of a breach is imputed to the covered entity. 
Finally, some commenters asked for more guidance on when a business 
associate is acting as an agent versus as an independent contractor and 
how to determine this status under the Federal common law of agency.
Final Rule
    The final rule modifies Sec.  164.410 only to make the following 
technical and non-substantive correction: in paragraph (a)(2) of Sec.  
164.410, the first sentence is revised to refer to paragraph (a)(1) 
rather than paragraph (1).
    With respect to the commenters who expressed concern that a covered 
entity's knowledge of a breach depends not only on a business 
associate's discovery of the breach but also on the covered entity's 
relationship with the business associate, we acknowledge that there are 
many different types of relationships that can develop between covered 
entities and business associates based upon the function the business 
associate performs on behalf of the covered entity. In some situations, 
a business associate will be acting as an agent of the covered entity, 
and as such, it makes sense to treat the business associate's knowledge 
of a breach analogous to the knowledge of one of the covered entity's 
own employees. However, in other situations, because a business 
associate may not be an agent of the covered entity, it would not be 
reasonable to impute the business associate's knowledge directly to the 
covered entity, and therefore, the covered entity's knowledge depends 
on notification from the business associate.
    Furthermore, the use of the Federal common law of agency to 
determine the business associate's status with respect to the covered 
entity is consistent with the approach taken in the Enforcement Rule 
for determining agency liability under the HIPAA Rules. Thus, we 
believe the use of the standard is appropriate here and should be 
familiar to most entities. We provide additional guidance regarding who 
is an agent above in our response to comments on the HITECH 
modifications to the HIPAA Enforcement Rule. Because of the agency 
implications on the timing of breach notifications, we encourage 
covered entities to discuss and define in their business associate 
agreements the requirements regarding how, when, and to whom a business 
associate should notify the covered entity of a potential breach.
Response to Other Public Comments
    Comment: Several commenters asked OCR to provide sample business 
associate agreement language to outline the covered entity's and 
business associate's obligations following a breach of unsecured 
protected health information.
    Response: A covered entity's and business associate's obligations 
following a breach of unsecured protected health information will vary 
depending on the relationship. For example, whether a business 
associate will send the breach notices to affected individuals and/or 
to notify the Secretary (and media, if applicable) on behalf of a 
covered entity is a business decision of the parties and how quickly a 
business associate is to notify a covered entity of a breach within the 
required timeframe may be based on a number of factors, such as whether 
the business associate is an agent of the covered entity. However, to 
help covered entities and business associates implement the new 
business associate agreement requirements generally under the HITECH 
modifications to the HIPAA Rules, the Department has published sample 
business associate agreement provisions on its web site.
    Comment: Some commenters asked what happens if a covered entity and 
a business associate disagree about whether an impermissible use or 
disclosure is a breach that requires notification. These commenters 
asked if both parties must be in agreement before breach notification 
obligations are triggered.
    Response: The covered entity is ultimately responsible for 
providing individuals with notification of breaches and, as indicated 
above, the clock for notifying individuals of breaches begins upon 
knowledge of the incident, even if it is not yet clear whether the 
incident qualifies as a breach for purposes of this rule. Further, this 
final rule clarifies that the default presumption is that an 
impermissible use or disclosure is a breach unless it can be determined 
through a risk assessment that there is a low probability that the data 
may be compromised. This standard should allow for more uniform 
application of the risk assessment approach across covered entities and 
business associates.
    Comment: One commenter stated that the requirement that a business

[[Page 5657]]

associate notify a covered entity of a breach of unsecured protected 
health information is duplicative of a business associate's other 
obligations to notify the covered entity of privacy violations and 
security incidents.
    Response: Business associates are required to report to covered 
entities any security incidents or uses or disclosures of protected 
health information not provided for by their business associate 
agreements, which include but are broader than breaches of unsecured 
protected health information under this Rule. For example, a security 
incident need not lead to unauthorized access to protected health 
information (and thus, is not a breach) but is still an event that 
should be reported to the covered entity. Further, when a security 
incident occurs that does rise to the level of a breach, the breach 
notice to the covered entity suffices to meet the requirement to report 
the security incident to the covered entity (however, a covered entity 
may require through the business associate agreement that additional 
information be reported). Therefore, these requirements are not 
duplicative.
6. Law Enforcement Delay
Interim Final Rule
    Section 13402(g) of the HITECH Act provides that if a law 
enforcement official determines that a notification, notice, or posting 
required under this section would impede a criminal investigation or 
cause damage to national security, such notification, notice, or 
posting shall be delayed in the same manner as provided under 45 CFR 
164.528(a)(2) of the Privacy Rule in the case of a disclosure covered 
under such section. Section 164.412 implements section 13402(g) of the 
Act, requiring a covered entity or business associate to temporarily 
delay notification to the individual, the media (if applicable), to a 
covered entity by a business associate, and to the Secretary if 
instructed to do so by a law enforcement official.
    Section 164.412(a), based on the requirements of 45 CFR 
164.528(a)(2)(i) of the Privacy Rule, provides for a temporary delay of 
notification in situations in which a law enforcement official provides 
a statement in writing that the delay is necessary because notification 
would impede a criminal investigation or cause damage to national 
security, and specifies the time for which a delay is required. In such 
instances, the covered entity is required to delay the notification, 
notice, or posting for the time period specified by the official.
    Similarly, Sec.  164.412(b), based on 45 CFR 164.528(a)(2)(ii) of 
the Privacy Rule, requires a covered entity or business associate to 
temporarily delay a notification, notice, or posting if a law 
enforcement official states orally that a notification would impede a 
criminal investigation or cause damage to national security. However, 
in this case, the covered entity or business associate must document 
the statement and the identity of the official and delay notification 
for no longer than 30 days, unless a written statement meeting the 
above requirements is provided during that time. We interpreted these 
provisions as tolling the time within which notification is required 
under Sec. Sec.  164.404, 164.406, 164.408, and 164.410, as applicable.
Final Rule
    The Department did not receive public comments on this provision of 
the interim final rule. We retain Sec.  164.412 in this final rule 
without modification.
7. Section 164.414--Administrative Requirements and Burden of Proof
Interim Final Rule
    Section 164.414(a) requires covered entities to comply with the 
administrative requirements of Sec.  164.530(b), (d), (e), (g), (h), 
(i), and (j) of the Privacy Rule with respect to the breach 
notification provisions of this subpart. These Privacy Rule provisions, 
for example, require covered entities and business associates to 
develop and document policies and procedures, train workforce members 
on and have sanctions for failure to comply with these policies and 
procedures, permit individuals to file complaints regarding these 
policies and procedures or a failure to comply with them, and require 
covered entities to refrain from intimidating or retaliatory acts. 
Thus, a covered entity is required to consider and incorporate the 
breach notification requirements with respect to its administrative 
compliance and other obligations.
    Section 164.414(b) provides that, following an impermissible use or 
disclosure under the Privacy Rule, covered entities and business 
associates have the burden of demonstrating that all notifications were 
made as required by this subpart. Additionally, as part of 
demonstrating that all required notifications were made, a covered 
entity or business associate, as applicable, also must be able to 
demonstrate that an impermissible use or disclosure did not constitute 
a breach, as such term is defined at Sec.  164.402, in cases where the 
covered entity or business associate determined that notifications were 
not required. To conform to these provisions, Sec.  160.534 of the 
HIPAA Enforcement Rule makes clear that, during any administrative 
hearing, the covered entity has the burden of going forward and the 
burden of persuasion with respect to these issues.
    Thus, when a covered entity or business associate knows of an 
impermissible use or disclosure of protected health information, it 
should maintain documentation that all required notifications were 
made, or, alternatively, to demonstrate that notification was not 
required: (1) Its risk assessment (discussed above in Sec.  164.402) 
demonstrating a low probability that the protected health information 
has been compromised by the impermissible use or disclosure or (2) the 
application of any other exceptions to the definition of ``breach.''
Overview of Public Comments
    One commenter stated that it is critical that all employees are 
trained and knowledgeable about what constitutes a breach, so that the 
covered entity or business associate can provide the required 
notifications within the required timeframe. The commenter also 
maintained that OCR should emphasize the necessity of this training.
    With respect to the burden of proof placed upon covered entities 
and business associates, one commenter agreed that covered entities and 
business associates should have the burden to demonstrate that all 
notifications were provided following a breach of unsecured protected 
health information. However, the commenter asked that we include a 
presumption that an impermissible use or disclosure of protected health 
information did not constitute a breach if a covered entity or business 
associate has implemented a breach notification policy, completed a 
risk assessment, and documented that it followed its policy in reaching 
a conclusion that breach notification was not required.
Final Rule
    We retain Sec.  164.414 in this final rule without modification. We 
emphasize the importance of ensuring that all workforce members are 
appropriately trained and knowledgeable about what constitutes a breach 
and on the policies and procedures for reporting, analyzing, and 
documenting a possible breach of unsecured protected health 
information. We note that because this final rule modifies the 
definition of breach as stated in the interim final rule, covered

[[Page 5658]]

entities will need to update their policies and procedures and retrain 
workforce members as necessary to reflect such modifications.
    With respect to this burden of proof, section 13402 of the statute 
places the burden of proof on a covered entity or business associate, 
if applicable, to demonstrate that all notifications were made as 
required. Therefore, section 164.530(j)(1)(iv) requires covered 
entities to maintain documentation to meet this burden of proof. This 
includes documentation that all required notifications have been 
provided or that no breach occurred and notification was not necessary. 
If a covered entity's determination with respect to whether a breach 
occurred is called into question, the covered entity should produce the 
documentation that demonstrates the reasonableness of its conclusions 
based on the findings of its risk assessment.
8. Technical Corrections
    The interim final rule made several technical changes to align the 
HIPAA Rules in light of the new breach notification requirements of 
subpart D. See 74 FR 42755-56. We did not receive comments on these 
changes. We retain the technical corrections made in the interim final 
rule and also make an additional technical correction by adding ``and'' 
to the end of Sec.  160.534(b)(1)(iii) to make clear the relationship 
between Sec.  160.534(b)(1)(iii) and the new Sec.  160.534(b)(1)(iv).
9. Preemption
Interim Final Rule
    The interim final rule clarified that contrary State law will be 
preempted by these breach notification regulations. Section 1178 of the 
Social Security Act, 42 U.S.C. 1320d-7, which was added by HIPAA, 
provides that HIPAA administrative simplification provisions generally 
preempt conflicting State law. Section 160.203 states that a standard, 
requirement, or implementation specification that is adopted as 
regulation at 45 CFR parts 160, 162, or 164 and that is ``contrary to a 
provision of State law preempts the provision of State law.'' Thus, 
whether a State law is contrary to these breach notification 
regulations is to be determined based on the definition of ``contrary'' 
at Sec.  160.202, which states that a State law is contrary if ``[a] 
covered entity would find it impossible to comply with both the State 
and Federal requirements'' or if the State law ``stands as an obstacle 
to the accomplishment and execution of the full purposes and 
objectives'' of the breach notification provisions in the Act. Covered 
entities must analyze relevant State laws with respect to the breach 
requirements to understand the interaction and apply this preemption 
standard appropriately.
    In the interim final rule, we stated our belief that, in general, 
covered entities can comply with both the applicable State laws and 
this regulation and that in most cases, a single notification can 
satisfy the notification requirements under State laws and this 
regulation. For example, if a State breach notification law requires 
notification be sent to the individual in a shorter time frame than is 
required by this regulation, a covered entity that sends the notice 
within the time frame required by the State law will also be in 
compliance with this regulation's timeliness requirements.
    Additionally, since the Act and rule are flexible in terms of how 
the elements are to be described, and do not prohibit additional 
elements from being included in the notice, in general, Federal 
requirements contain flexibility for covered entities to develop a 
notice that satisfies both laws.
Overview of Public Comments
    While some commenters were pleased that the breach notification 
rule preempts conflicting State law, other commenters expressed 
confusion or concern with this preemption standard. Many commenters 
stated that despite the fact that in most cases a covered entity may 
only need to provide one notification to satisfy both State and Federal 
law, there will be some cases in which a covered entity will have to 
provide multiple notices to the same individual to ensure compliance 
with all relevant laws. This will result in confusion for the 
individual and increased costs for the covered entity. Some of these 
commenters suggested that this Federal breach notification law should 
preempt all State breach notification laws, or alternatively, that HHS 
should work with Congress and the States to harmonize the breach 
notification laws such that only one notice is required following a 
breach.
Final Rule
    We maintain the preemption standard discussed in the interim final 
rule, which is based on section 1128 of the Social Security Act and 
applies to the HITECH Act's breach notification provisions by virtue of 
section 13421 of the HITECH Act. We continue to believe that, 
generally, covered entities are able to comply with both State and 
Federal requirements for providing breach notification with one breach 
notice based on the flexibility provided to entities in this Rule. 
However, even in the exceptional case, we do not have authority to 
preempt a State breach notification law that is not contrary to this 
Rule.
10. Responses to Other Public Comments
    Comment: One commenter asked whether penalties are automatically 
assessed following a violation of the breach notification rule or if 
this is done at OCR's discretion and whether civil money penalties can 
be assessed for the underlying cause of a breach of unsecured protected 
health information where a covered entity has provided all required 
breach notifications.
    Response: OCR's enforcement of the breach notification rule will be 
carried out pursuant to the Enforcement Rule. Pursuant to the 
Enforcement Rule, OCR may impose a civil money penalty for a failure to 
comply with the breach notification rule. OCR also has the discretion 
to work with the covered entity to achieve voluntary compliance through 
informal resolution, except in cases in which it has found a violation 
due to willful neglect. Because every breach of unsecured protected 
health information must have an underlying impermissible use or 
disclosure under the Privacy Rule, OCR also has the authority to impose 
a civil money penalty for the underlying Privacy Rule violation, even 
in cases where all required breach notifications were provided.

VI. Modifications to the HIPAA Privacy Rule Under GINA

A. Background

    The Genetic Information Nondiscrimination Act of 2008 (``GINA''), 
Public Law 110-233, 122 Stat. 881, prohibits discrimination based on an 
individual's genetic information in both the health coverage and 
employment contexts. With respect to health coverage, Title I of GINA 
generally prohibits discrimination in premiums or contributions for 
group coverage based on genetic information, proscribes the use of 
genetic information as a basis for determining eligibility or setting 
premiums in the individual and Medicare supplemental (Medigap) 
insurance markets, and limits the ability of group health plans, health 
insurance issuers, and Medigap issuers to collect genetic information 
or to request or require that individuals undergo genetic testing. 
Title II of GINA generally prohibits use of genetic information in the 
employment context, restricts employers and other entities covered by 
Title II from requesting, requiring, or purchasing genetic

[[Page 5659]]

information, and strictly limits such entities from disclosing genetic 
information. The Departments of Labor, Treasury, and Health and Human 
Services (HHS) are responsible for administering and enforcing the GINA 
Title I nondiscrimination provisions, and the Equal Employment 
Opportunity Commission (EEOC) is responsible for administering and 
enforcing the GINA Title II nondiscrimination provisions.\13\
---------------------------------------------------------------------------

    \13\ The Departments of Labor (Employee Benefits Security 
Administration), Treasury (Internal Revenue Service), and HHS 
(Centers for Medicare & Medicaid Services (CMS)) have issued 
regulations in a separate rulemaking (at 74 FR 51664) to implement 
sections 101-103 of GINA, which amended: section 702 of the Employee 
Retirement Income Security Act of 1974 (29 U.S.C. 1182); section 
2702 of the Public Health Service Act (42 U.S.C. 300gg-1) 
(renumbered as section 2705 by the Affordable Care Act); and section 
9802 of the Internal Revenue Code of 1986. Section 104 of GINA 
applies to Medigap issuers, which are subject to the provisions of 
section 1882 of the Social Security Act that are implemented by CMS, 
and which incorporate by reference certain provisions in a model 
regulation of the National Association of Insurance Commissioners 
(NAIC). The NAIC amended its model regulation on September 24, 2008, 
to conform to section 104 of GINA, and the amended regulation was 
published by CMS in the Federal Register on April 24, 2009, at 74 FR 
18808. With respect to Title II of GINA, the EEOC issued final 
regulations on November 9, 2010, at 75 FR 68912.
---------------------------------------------------------------------------

    In addition to these nondiscrimination provisions, section 105 of 
Title I of GINA contains new privacy protections for genetic 
information, which require the Secretary of HHS to revise the Privacy 
Rule to clarify that genetic information is health information and to 
prohibit group health plans, health insurance issuers (including HMOs), 
and issuers of Medicare supplemental policies from using or disclosing 
genetic information for underwriting purposes.\14\
---------------------------------------------------------------------------

    \14\ Section 105 of GINA, entitled ``Privacy and 
Confidentiality,'' amends Part C of Title XI of the Social Security 
Act by adding section 1180 to address the application of the HIPAA 
Privacy Rule to genetic information.
---------------------------------------------------------------------------

B. Overview of the Proposed Rule

    On October 7, 2009, the Department published a notice of proposed 
rulemaking (NPRM or ``proposed rule'') to strengthen the privacy 
protections for genetic information under the HIPAA Privacy Rule by 
implementing the protections for genetic information required by GINA 
\15\ and making related changes to the Rule. In particular, in 
accordance with section 105 of GINA and the Department's general 
authority under sections 262 and 264 of HIPAA, the Department proposed 
to: (1) Explicitly provide that genetic information is health 
information for purposes of the Privacy Rule; (2) prohibit all health 
plans covered by the HIPAA Privacy Rule from using or disclosing 
protected health information that is genetic information for 
underwriting purposes; (3) revise the provisions relating to the Notice 
of Privacy Practices for health plans that perform underwriting; (4) 
make a number of conforming changes to definitions and other provisions 
of the Rule; and (5) make technical corrections to update the 
definition of ``health plan.''
---------------------------------------------------------------------------

    \15\ Any reference in this preamble to GINA is a reference to 
Title I of GINA, except as otherwise indicated.
---------------------------------------------------------------------------

    The 60-day public comment period for the proposed rule closed on 
December 7, 2009, and the Department received approximately twenty-five 
comments in response to its proposal.\16\ After considering the public 
comments, the Department is issuing this final rule to strengthen the 
privacy protections for genetic information in accordance with GINA and 
the Department's general authority under sections 262 and 264 of HIPAA. 
In developing this rule, the Department consulted with the Departments 
of Labor and Treasury, as required by section 105(b)(1) of GINA, to 
ensure, to the extent practicable, consistency across the regulations. 
In addition, the Department coordinated with the EEOC in the 
development of these regulations.
---------------------------------------------------------------------------

    \16\ The public comments are available at https://www.regulations.gov.
---------------------------------------------------------------------------

    The provisions of the proposed rule and the public comments 
received that were within the scope of the proposed rule are described 
in more detail below in the section-by-section description of the final 
rule.

C. Section-by-Section Description of Final Rule and Response to Public 
Comments

1. Scope: Extension of Required Protections to All Health Plans Subject 
to the HIPAA Privacy Rule
Proposed Rule
    Section 105 of GINA requires HHS to modify the Privacy Rule to 
prohibit ``a covered entity that is a group health plan, health 
insurance issuer that issues health insurance coverage, or issuer of a 
medicare [sic] supplemental policy'' from using or disclosing genetic 
information for underwriting purposes. Section 105 of GINA provides 
that the terms ``group health plan'' and ``health insurance coverage'' 
have the meanings given such terms under section 2791 of the Public 
Health Service Act (PHSA) (42 U.S.C. 300gg-91), and that the term 
``medicare [sic] supplemental policy'' has the meaning given such term 
in section 1882(g) of the Social Security Act. In addition, the term 
``health insurance issuer,'' as defined at 42 U.S.C. 300gg-91, includes 
a health maintenance organization (HMO). These four types of entities 
(i.e., group health plans, health insurance issuers, and health 
maintenance organizations, as defined in the PHSA, as well as issuers 
of Medicare supplemental policies), correspond to the types of covered 
entities listed at subparagraphs (i) through (iii) and (vi) of 
paragraph (1) of the definition of ``health plan'' at Sec.  160.103 in 
the HIPAA Privacy Rule, issued under HIPAA's Administrative 
Simplification provisions. These also are the entities to which HIPAA's 
nondiscrimination provisions apply and to which the nondiscrimination 
provisions of GINA Title I were directed.
    However, in addition to these four types of entities, the HIPAA 
Privacy Rule also includes a number of other entities within the 
definition of ``health plan'': (1) Long-term care policies (excluding 
nursing home fixed-indemnity policies); (2) employee welfare benefit 
plans or other arrangements that are established or maintained for the 
purpose of offering or providing health benefits to the employees of 
two or more employers (to the extent that they are not group health 
plans or health insurance issuers); (3) high risk pools that are 
mechanisms established under State law to provide health insurance 
coverage or comparable coverage to eligible individuals; (4) certain 
public benefit programs, such as Medicare Part A and B, Medicaid, the 
military and veterans' health care programs, the Indian Health Service 
program, and others; as well as (5) any other individual or group plan, 
or combination of individual or group plans that provides or pays for 
the cost of medical care (as the term ``medical care'' is defined in 
section 2791(a)(2) of the PHSA, 42 U.S.C. 300gg-91(a)(2)). This last 
category includes, for example, certain ``excepted benefits'' plans 
described at 42 U.S.C. 300gg-91(c)(2), such as limited scope dental or 
vision benefits plans. See the definition of ``health plan'' at Sec.  
160.103.
    In the NPRM, the Department, using both its authority under GINA as 
well as its broad authority under HIPAA, proposed to apply the 
prohibition on using and disclosing protected health information that 
is genetic information for underwriting to all health plans that are 
subject to the Privacy Rule, rather than solely to the plans GINA 
explicitly requires be subject to the prohibition. As explained in the 
proposed rule, the HIPAA Administrative Simplification provisions 
provide the Secretary with

[[Page 5660]]

broad authority to craft privacy standards that uniformly apply to all 
health plans, regardless of whether such health plans are governed by 
other portions of the HIPAA statute. In addition, the Department 
indicated in the proposed rule that nothing in GINA explicitly or 
implicitly curtails this broad authority of the Secretary to promulgate 
privacy standards for any and all health plans that are governed by the 
HIPAA Administrative Simplification provisions.
    Under the Privacy Rule, and consistent with HIPAA, an individual's 
privacy interests and rights with respect to the use and disclosure of 
protected health information are protected uniformly without regard to 
the type of health plan that holds the information. Thus, under the 
Privacy Rule, individuals can expect and benefit from privacy 
protections that do not diminish based on the type of health plan from 
which they obtain health coverage. In developing the proposed rule, the 
Department believed that individuals' interests in uniform protection 
under the Privacy Rule against the use or disclosure of their genetic 
information for underwriting purposes would outweigh any adverse impact 
on health plans that are not covered by GINA, particularly since it was 
not expected that all of the health plans subject to the Privacy Rule 
use or disclose protected health information that is genetic 
information for underwriting (or even perform underwriting generally, 
in the case of some of the public benefit plans). For these reasons, 
the Department proposed to apply the prohibition on using or disclosing 
protected health information that is genetic information for 
underwriting purposes to all health plans that are HIPAA covered 
entities.
Overview of Public Comments
    The Department received comments both in support of and against the 
proposed application of the prohibition on using or disclosing genetic 
information for underwriting purposes to all health plans covered by 
the Privacy Rule. Several commenters agreed that the extension of the 
proposed requirements to all health plans is an appropriate exercise of 
the Secretary's discretion under HIPAA and is necessary to protect the 
privacy interests of all individuals without regard to the type of 
health plan holding individuals' health information, and stated that 
such an extension would further encourage individuals to take advantage 
of genetic services. In addition, one commenter in support of the 
proposal indicated that sixteen States also regulate the use of genetic 
information in disability insurance, and ten States regulate its use in 
long-term care insurance, and it is expected that these numbers will 
continue to increase. The commenter stated that as States move forward 
in this area it was appropriate for the Federal government to do so as 
well. However, this and one other commenter, while generally in support 
of extending the prohibition on using or disclosing genetic information 
for underwriting to all health plans, also recommended that the 
Department monitor the impact of such a prohibition on long-term care 
insurers.
    A few commenters did not support the Department's proposal and 
argued that the prohibition against using or disclosing genetic 
information for underwriting purposes in the Privacy Rule should apply 
only to those plans to which GINA expressly applies. Commenters argued 
that applying the prohibition beyond the health plans identified in 
GINA was contrary to GINA and its intent.
    Certain commenters expressed particular disagreement and concern 
with applying the prohibition on the use of genetic information for 
underwriting to long-term care insurers. One commenter argued that 
there was clear Congressional intent in the legislative history of GINA 
to exempt ``excepted benefits,'' particularly long-term care insurance, 
from any prohibitions under GINA and thus, the Privacy Rule should not 
apply the prohibition on underwriting with genetic information to 
issuers of long term care policies. The commenter also argued that the 
GINA prohibition should not apply to long-term care insurers because 
long-term care plans have different characteristics from other health 
plans and applying the GINA prohibition to long-term care insurers 
would jeopardize the ability of long-term care insurers to adequately 
underwrite and thus, the viability of the long-term care insurance 
market. The commenter explained that this would be due to the fact that 
when underwriting, long term care insurers look to determine an 
individual's probability of needing long-term care in the future and 
diagnosis of a particular condition is not the only way this may be 
determined and in some cases may not even be relevant to such a 
determination. The Department also heard similar concerns about the 
potential negative impact of an underwriting prohibition on the 
economic viability of the long-term market, from certain members of 
Congress who wrote to the Secretary on this issue, as well as from 
certain outside parties during fact finding meetings held by the 
Department.
Final Rule
    The final rule adopts the approach of the proposed rule to apply 
the prohibition on using or disclosing protected health information 
that is genetic information for underwriting purposes to all health 
plans that are covered entities under the HIPAA Privacy Rule, including 
those to which GINA does not expressly apply, except with regard to 
issuers of long term care policies. We continue to disagree with the 
commenters that stated such an extension would conflict with GINA and 
is outside the scope of our authority. As explained more fully in the 
proposed rule, the Department has broad authority under HIPAA to 
regulate a health plan's uses and disclosures of protected health 
information, including genetic information, to protect an individual's 
privacy interests. See 74 FR 51698, 51699-51700. It does not follow 
that by exempting ``excepted benefits'' from the prohibitions under 
GINA that Congress intended to restrict the Department's broad 
authority under HIPAA. Further, there is no conflict with GINA in 
extending the same privacy protections outlined in GINA to those health 
plans that are not covered by GINA but are otherwise covered by the 
HIPAA Privacy Rule. GINA and section 264 of HIPAA are not 
irreconcilably inconsistent but rather operate concurrently without 
conflict. Lastly, GINA did not override HIPAA, and did not displace the 
Department's authority to prohibit uses and disclosures of genetic 
information that GINA does not otherwise prohibit. Therefore, nothing 
in GINA explicitly or implicitly curtails the broad authority of the 
Secretary to promulgate privacy standards for any and all health plans 
that are governed by the HIPAA Administrative Simplification 
provisions.
    We also continue to believe that individuals have a strong privacy 
interest in not having their genetic information used in an adverse 
manner for underwriting purposes and to believe that this privacy 
interest outweighs any adverse impact on most health plans covered by 
the Privacy Rule. With respect to most health plans not subject to 
GINA, the public comment did not indicate that a prohibition on using 
genetic information for underwriting would have significant adverse 
impacts on the viability of these plans. Nor did the public comment 
generally provide information showing that these health plans actually 
use or disclose protected health information that is genetic 
information for underwriting, or plan to

[[Page 5661]]

do so in the future (or even perform underwriting generally, in the 
case of some of the public benefit plans).
    However, as indicated above, the Department did hear from a number 
of sources about the potential adverse impact a prohibition on using 
genetic information for underwriting would have on the ability of a 
long-term care insurer to effectively underwrite and thus, on the 
viability of the long-term care insurance market generally. The 
Department recognizes the importance of long-term care insurance 
coverage and the need to ensure its continued availability. The 
Department also acknowledges that, at this time, it does not have the 
information necessary to more precisely and carefully measure the 
extent of such an impact on the long-term market in order to 
appropriately balance an individual's privacy interests with such an 
impact. Thus, this final rule excludes long-term care plans from the 
underwriting prohibition.
    While we exempt long-term care plans from the underwriting 
prohibition in this final rule, we continue to believe an individual 
has a strong privacy interest in the way his or her genetic information 
is used for the underwriting of long-term care insurance. At the 
current time, however, we do not have sufficient information to 
determine the proper balance between the individual's privacy interests 
and the industry's concerns about the cost effects of excluding genetic 
information. For that reason, we are looking into ways to obtain 
further information on this issue, such as through a study by the 
National Association of Insurance Commissioners (NAIC) on the tension 
between the use of genetic information for underwriting and the 
associated privacy concerns in the context of their model long-term 
care rules. Based on the information the Department may obtain, the 
Department will reassess how best to move forward in this area in the 
future.
    Long-term care plans, while not subject to the underwriting 
prohibition, continue to be bound by the Privacy Rule, as are all other 
covered health plans, to protect genetic information from improper uses 
and disclosures, and to only use or disclose genetic information as 
required or expressly permitted by the Rule, or as otherwise authorized 
by the individual who is the subject of the genetic information.
2. Section 160.101--Statutory Basis and Purpose
    We have revised Sec.  160.101, which describes the statutory basis 
of the HIPAA Rules, to include a reference to section 1180 of the 
Social Security Act, as added by section 105 of GINA (Pub. L. 110-233).
3. Section 160.103--Definitions
    The final rule modifies Sec.  160.103 of the Privacy Rule to: (1) 
Revise the definition of ``health information'' to make clear that the 
term includes ``genetic information;'' (2) add definitions for the 
GINA-related terms of ``family member,'' ``genetic information,'' 
``genetic services,'' ``genetic test,'' and ``manifestation or 
manifested;'' and (3) make technical corrections to the definition of 
``health plan.'' With respect to the GINA-related terms, the final rule 
adopts definitions that are generally consistent with the definitions 
of such terms promulgated in the implementing regulations for sections 
101-103 of GINA. This will facilitate compliance for those health plans 
subject to both the privacy as well as the nondiscrimination provisions 
of GINA.
a. Definition of ``Health information''
Proposed Rule
    Prior to enactment of GINA, the Department issued guidance that 
genetic information is health information protected by the Privacy Rule 
to the extent that such information is individually identifiable and 
held by a covered entity (subject to the general exclusions from the 
definition of ``protected health information'').\17\ Section 105 of 
GINA requires the Secretary to revise the Privacy Rule to make clear 
that genetic information is health information under the Rule. Thus, 
the Department proposed to modify the definition of ``health 
information'' at Sec.  160.103 to explicitly provide that such term 
includes genetic information.
---------------------------------------------------------------------------

    \17\ See, e.g., Frequently Asked Question number 354, available 
at https://www.hhs.gov/ocr/privacy/hipaa/faq/protected_health_information/354.html, which states: Question: Does the HIPAA Privacy 
Rule protect genetic information? Answer: Yes, genetic information 
is health information protected by the Privacy Rule. Like other 
health information, to be protected it must meet the definition of 
protected health information: it must be individually identifiable 
and maintained by a covered health care provider, health plan, or 
health care clearinghouse. See also 45 CFR 160.103.
---------------------------------------------------------------------------

Overview of Public Comments
    The Department received a few comments expressing specific support 
for and one comment against the proposed inclusion of the term 
``genetic information'' in the definition of ``health information.'' 
The commenters supporting the revision to the definition of ``health 
information'' indicated that such an inclusion was necessary to clarify 
that genetic information is health information. The commenter against 
the proposed inclusion to the definition argued that although GINA 
directs the Department to treat genetic information as health 
information, the language of GINA does not require a change to the 
definition of ``health information,'' and this change would create 
costs for health plans, which would have to update all their policies 
and procedures to reflect the change.
Final Rule
    The final rule adopts the proposed modification to the definition 
of ``health information'' at Sec.  160.103. This modification to the 
definition is a necessary clarification to the Privacy Rule based on 
the statutory language. Given that revising the definition of ``health 
information'' to include genetic information does not substantively 
change the scope of the Privacy Rule, it is unclear why such a change 
alone would require revisions to a health plan's policies and 
procedures. Health plans that perform underwriting will otherwise need 
to revise their policies and procedures as necessary to comply with 
this final rule, as well as the modifications to the HIPAA Rules 
required by the Health Information Technology for Economic and Clinical 
Health (HITECH) Act. Thus, to the extent the concern about this 
modification stems from the fact that a health plan's policies and 
procedures quote the prior regulatory definition of ``health 
information,'' the health plan can revise the definition at the time it 
is otherwise updating its policies and procedures to comply with these 
rules.
b. Definition of ``Genetic Information''
Proposed Rule
    The term ``genetic information'' is defined in GINA and establishes 
what information is protected by the statute. Section 105 of GINA 
provides that the term ``genetic information'' in section 105 shall 
have the same meaning given the term in section 2791 of the PHSA (42 
U.S.C. 300gg-91), as amended by section 102 of GINA. Section 102(a)(4) 
of GINA defines ``genetic information'' to mean, with respect to any 
individual, information about: (1) Such individual's genetic tests; (2) 
the genetic tests of family members of such individual; and (3) the 
manifestation of a disease or disorder in family members of such 
individual (i.e., family medical history). GINA also provides that the 
term ``genetic information'' includes, with respect to any individual, 
any request for, or receipt of, genetic services, or participation in 
clinical research which includes genetic services, by such

[[Page 5662]]

individual or family member of such individual. GINA expressly provides 
that the term ``genetic information'' shall not include information 
about the sex or age of any individual. This basic definition of 
``genetic information'' in section 102(a)(4) of GINA (and that is to 
apply for purposes of section 105) is also expanded by section 
102(a)(3), which provides that any reference to genetic information 
concerning an individual or family member in the PHSA shall include: 
with respect to an individual or family member of an individual who is 
a pregnant woman, the genetic information of any fetus carried by such 
pregnant woman; and with respect to an individual or family member 
utilizing an assisted reproductive technology, the genetic information 
of any embryo legally held by the individual or family member. The 
Department proposed to include this statutory definition of ``genetic 
information'' in Sec.  160.103.
Overview of Public Comments
    Most commenters did not address the proposed definition of 
``genetic information'' in their comments on the proposed rule. 
However, one commenter stated that it was unclear what information may 
fall within the scope of the term ``genetic information'' and whether 
such term may be construed to include traditional medical information 
or medical tests used in underwriting today.
Final Rule
    The final rule adopts without modification the definition of 
``genetic information'' proposed in the NPRM. This definition is 
consistent with the definition found in the implementing regulations 
for sections 101-103 of GINA and with which compliance is already 
required by most health plans. The term ``genetic information'' 
includes information about the genetic tests of the individual or of 
the individual's family members and about diseases or disorders 
manifested in an individual's family members (i.e., family health 
history). Thus, information about manifested diseases, disorders, or 
conditions of the individual or medical tests that do not meet the 
rule's definition of ``genetic test,'' such as HIV tests, complete 
blood counts, cholesterol or liver function tests, or tests to detect 
for the presence of alcohol or drugs, are not genetic information, and 
such information may be used or disclosed for underwriting purposes. 
Conversely, family health histories and information about genetic 
tests, such as tests to determine whether an individual or family 
member has a gene variant associated with breast cancer, are genetic 
information, and such information may not be used or disclosed for 
underwriting purposes. The definitions of ``manifestation or 
manifested'' and ``genetic test'' are discussed more fully below.
c. Definition of ``Genetic Test''
Proposed Rule
    As explained above, GINA provides that the term ``genetic 
information'' includes information about an individual's genetic tests 
or the genetic tests of family members of the individual. Section 105 
of GINA provides that the term ``genetic test'' shall have the same 
meaning as the term has in section 2791 of the PHSA (42 U.S.C. 300gg-
91), as amended by section 102 of GINA. Section 102(a)(4) of GINA 
amends section 2791(d) of the PHSA to define ``genetic test'' to mean 
``an analysis of human DNA, RNA, chromosomes, proteins, or metabolites, 
that detects genotypes, mutations, or chromosomal changes.'' GINA 
further clarifies that the term ``genetic test'' does not include an 
analysis of proteins or metabolites that does not detect genotypes, 
mutations, or chromosomal changes, nor does it include an analysis of 
proteins or metabolites that is directly related to a manifested 
disease, disorder, or pathological condition that could reasonably be 
detected by a health care professional with appropriate training and 
expertise in the field of medicine involved.
    Consistent with the statutory definition, the Department proposed 
to define ``genetic test'' at Sec.  160.103 as an analysis of human 
DNA, RNA, chromosomes, proteins, or metabolites, if the analysis 
detects genotypes, mutations, or chromosomal changes, and to provide in 
the definition that ``genetic test'' does not include an analysis of 
proteins or metabolites that is directly related to a manifested 
disease, disorder, or pathological condition. While the statute refers 
to a ``manifested'' disease as one that could reasonably be detected by 
a health care professional with appropriate training and expertise in 
the field of medicine involved, the statute does not define 
``manifested.'' Consequently, for clarity, the Department proposed a 
definition of ``manifested,'' as described below.
Overview of Public Comments
    The Department received one comment requesting that the Department 
include examples within the regulatory text of the definition and 
another comment stated that it is not clear what constitutes a genetic 
test under the definition.
Final Rule
    The final rule adopts without modification the definition of 
``genetic test'' as proposed in the NPRM. This definition is consistent 
with the definition found in the implementing regulations for sections 
101-103 of GINA and with which compliance is already required by most 
health plans. Under this definition, a test to determine whether an 
individual has a gene variant associated with breast cancer (such as 
the BRCA1 or BRCA2 variant) is a genetic test. Similarly, a test to 
determine whether an individual has a genetic variant associated with 
hereditary nonpolyposis colorectal cancer is a genetic test. Such tests 
are genetic in nature because they detect genotypes, mutations, or 
chromosomal changes. In contrast, medical tests that do not detect 
genotypes, mutations, or chromosomal changes, are not genetic tests. 
For example, HIV tests, complete blood counts, cholesterol tests, liver 
function tests, or tests for the presence of alcohol or drugs are not 
genetic tests. Consistent with the approach taken generally with the 
HIPAA Privacy Rule, the Department declines to include these examples 
in the regulatory text. The Department intends to issue future guidance 
on its web site about this issue.
d. Definition of ``Genetic Services''
Proposed Rule
    GINA provides that the term ``genetic information'' includes, with 
respect to any individual, any request for, or receipt of, genetic 
services, or participation in clinical research which includes genetic 
services, by such individual or any family member of such individual. 
Section 102(a)(4) of GINA defines ``genetic services'' to mean: (1) A 
genetic test; (2) genetic counseling (including obtaining, 
interpreting, or assessing genetic information); or (3) genetic 
education. Thus, the fact that an individual or a family member of the 
individual requested or received a genetic test, counseling, or 
education is information protected under GINA. Genetic counseling and 
education are means by which individuals can obtain information and 
support about potential risks for genetic diseases and disorders. The 
Department proposed to add the statutory definition of ``genetic 
services'' to the Privacy Rule.
Overview of Public Comments
    The Department received one comment requesting that the

[[Page 5663]]

Department add language to the definition to make clear that the 
genetic tests, genetic counseling, or genetic education of a family 
member of an individual are specifically covered by the term.
Final Rule
    The final rule adopts without modification the definition of 
``genetic services'' proposed in the NPRM. This definition is 
consistent with the definition found in the implementing regulations 
for sections 101-103 of GINA and with which compliance is already 
required by most health plans. The Department does not believe it 
necessary to add the term ``family member'' to the definition of 
``genetic services'' because the definition of ``genetic information'' 
makes clear that information about any request for, or receipt of, 
genetic services by a family member of an individual is protected 
information.
e. Definition of ``Family Member''
Proposed Rule
    The term ``family member'' is used in the definition of ``genetic 
information'' in GINA to indicate that an individual's genetic 
information also includes information about the genetic tests of the 
individual's family members, as well as family medical history. Section 
105 of GINA states that the term ``family member'' shall have the 
meaning given such term in section 2791 of the PHSA (42 U.S.C. 300gg-
91), as amended by GINA section 102(a)(4), which defines ``family 
member'' to mean, with respect to any individual: (1) A dependent (as 
such term is used for purposes of section 2701(f)(2) of the PHSA, 42 
U.S.C. 300gg(f)(2)) of such individual; or (2) any other individual who 
is a first-degree, second-degree, third-degree, or fourth-degree 
relative of such individual or of a dependent of the individual. 
Section 2701(f)(2) of the PHSA uses the term ``dependent'' to mean an 
individual who is or may become eligible for coverage under the terms 
of a group health plan because of a relationship to the plan 
participant.
    The Department proposed to incorporate GINA's definition of 
``family member'' into the Privacy Rule. The proposed rule also 
clarified within the definition that relatives by affinity (such as by 
marriage or adoption) are to be treated the same as relatives by 
consanguinity (that is, relatives who share a common biological 
ancestor) and that, in determining the degree of relationship, 
relatives by less than full consanguinity (such as half-siblings, who 
share only one parent) are treated the same as relatives by full 
consanguinity (such as siblings who share both parents). The NPRM 
explained that this broad interpretation of ``family member'' was 
consistent with GINA's legislative history, which suggests that the 
term ``family member'' is to be broadly construed to provide the 
maximum protection against discrimination.\18\ In addition, the 
Department proposed to include in the definition of ``family member'' 
non-exhaustive lists of persons who are first-, second-, third-, or 
fourth-degree relatives. Finally, within the definition of ``family 
member,'' the Department proposed to refer to the definition of 
``dependent'' contained in the implementing regulations at 45 CFR 
144.103 rather to the PHSA directly.
---------------------------------------------------------------------------

    \18\ See House Report 110-28, Part 2 at 27.
---------------------------------------------------------------------------

Overview of Public Comments
    One commenter expressed support for including relatives by affinity 
and by less than full consanguinity, agreeing that this interpretation 
is consistent with Congressional intent and provides the most privacy 
protection for individuals. This commenter also was supportive of 
including non-exhaustive lists of persons who are first-, second-, 
third-, and fourth-degree relatives to add clarity to the definition.
Final Rule
    As we received only support with regard to the definition of 
``family member,'' the final rule adopts without modification the 
definition of ``family member'' proposed in the NPRM. This definition 
also is consistent with the definition found in the implementing 
regulations for sections 101-103 of GINA and with which compliance is 
already required by most health plans.
f. Definition of ``Manifestation or Manifested''
Proposed Rule
    Although not separately defined by GINA, the terms 
``manifestation'' or ``manifested'' are used in GINA in three important 
contexts. First, GINA uses the term ``manifestation'' to incorporate 
``family medical history'' into the definition of ``genetic 
information'' by stating that ``genetic information'' includes, with 
respect to an individual, the manifestation of a disease or disorder in 
family members of such individual. Second, GINA uses the term 
``manifested'' to exclude from the definition of ``genetic test'' those 
tests that analyze a physical malady rather than genetic makeup by 
excluding from the definition analyses of proteins or metabolites that 
are directly related to a manifested disease, disorder, or pathological 
condition. Third, GINA uses the term ``manifestation'' to clarify that 
nothing in Title I of GINA should be construed to limit the ability of 
a health plan to adjust premiums or contribution amounts for a group 
health plan based on the manifestation of a disease or disorder of an 
individual enrolled in the plan.\19\ However, GINA provides that, in 
such case, the manifestation of a disease or disorder in one individual 
cannot also be used as genetic information about other group members 
and to further increase the premium for the plan. Similarly, for the 
individual health insurance market, GINA clarifies that it does not 
prohibit a health plan from establishing rules for eligibility for an 
individual to enroll in coverage or from adjusting premium or 
contribution amounts for an individual based on the manifestation of a 
disease or disorder in that individual or in a family member of such 
individual where such family member is covered under the individual's 
policy. However, under GINA, the manifestation of a disease or disorder 
in one individual cannot also be used as genetic information about 
other individuals and to further increase premiums or contribution 
amounts.
---------------------------------------------------------------------------

    \19\ We note that the Affordable Care Act, enacted on March 23, 
2010, includes a provision effective for plan years beginning on or 
after January 1, 2014, that prohibits insurers from discriminating 
against individuals or charging individuals higher rates based on 
pre-existing conditions. See Public Law 111-148.
---------------------------------------------------------------------------

    Given the importance of the term ``manifested'' or 
``manifestation,'' the Department proposed to define the term. Although 
GINA does not define the term, it is clear from the statutory 
definition of ``genetic test'' that a manifested disease or disorder is 
one ``that could reasonably be detected by a health care professional 
with appropriate training and expertise in the field of medicine 
involved.'' Accordingly, the proposed rule defined the term 
``manifestation or manifested'' to mean, with respect to a disease, 
disorder, or pathological condition, that an individual has been or 
could reasonably be diagnosed with the disease, disorder, or 
pathological condition by a health care professional with appropriate 
training and expertise in the field of medicine involved. The proposed 
definition also provided that a disease, disorder, or pathological 
condition is not manifested if the diagnosis is based principally on 
genetic information. This clarification was included due to the fact 
that variants of genes associated with diseases have varying degrees of 
predictive power for

[[Page 5664]]

later development of the disease. In some cases, an individual may have 
a genetic variant for a disease and yet never develop the disease. In 
other cases, the presence of a genetic variant indicates that the 
individual will eventually develop the disease, such as is the case 
with Huntington's disease. However, an individual may obtain a positive 
test that shows the genetic variant for Huntington's disease decades 
before any clinical symptoms appear. Under the proposed definition, the 
presence of a genetic variant alone would not constitute the diagnosis 
of a disease even in cases where it is certain the individual 
possessing the genetic variant will eventually develop the disease, 
such as with Huntington's disease.
Overview of Public Comments
    A few commenters expressed support for adopting the proposed 
definition of ``manifestation or manifested'' because it would provide 
clarity to the rule and the scope of the underwriting prohibition. One 
commenter requested that the Department include the examples provided 
in the preamble to the proposed rule directly within the regulatory 
definition. A few commenters raised concerns about the inclusion in the 
proposed definition of the clarification that ``a disease, disorder, or 
pathological condition is not manifested if the diagnosis is based 
principally on genetic information.'' It was argued that the proposed 
definition was too narrow because, for some diseases, disorders, or 
pathological conditions, a genetic test is the primary means of 
diagnosing the condition and further that genetic tests will more 
frequently be used to diagnose diseases or conditions in the future 
given the continuing evolution of genetics. It was also argued that the 
proposed definition went beyond GINA by indicating how a manifested 
disease or disorder is diagnosed.
Final Rule
    The final rule adopts without modification the definition of 
``manifestation or manifested'' proposed in the NPRM. The definition is 
consistent with the definition of ``manifestation or manifested'' found 
in the implementing regulations for the non-discrimination provisions 
of sections 101-103 of GINA and with which compliance is already 
required for most health plans. In developing this definition, the 
agencies consulted with technical experts at the National Human Genome 
Research Institute within the National Institutes of Health (NIH). In 
addition, for the reasons stated above regarding the varying degrees of 
predictive power genes provide in terms of ultimate development of a 
disease, as well as of the fact that a genetic test for a disease may 
precede clinical signs or symptoms by years or even decades, the 
Department does not believe that the definition is too narrow but 
rather that it is consistent with the provisions of GINA that protect 
genetic information from being used for health coverage determinations. 
Finally, the definition does not preclude a health care provider from 
performing one or more genetic tests to confirm a diagnosis so long as 
the diagnosis is not based solely or principally on the result of the 
genetic test.
    To illustrate the definition, we provide the following examples, 
which were also included in the NPRM:
     An individual may have a family member that has been 
diagnosed with Huntington's disease and also have a genetic test result 
that indicates the presence of the Huntington's disease gene variant in 
the individual. However, when the individual is examined by a 
neurologist (a physician with appropriate training and expertise for 
diagnosing Huntington's disease) because the individual has begun to 
suffer from occasional moodiness and disorientation (symptoms which are 
associated with Huntington's disease), and the results of the 
examination do not support a diagnosis of Huntington's disease, then 
Huntington's disease is not manifested with respect to the individual. 
In contrast, if the individual exhibits additional neurological and 
behavioral symptoms, and the results of the examination support a 
diagnosis of Huntington's disease by the neurologist, then Huntington's 
disease is manifested with respect to the individual.
     An individual has had several family members with colon 
cancer, one of whom underwent genetic testing which detected a mutation 
in the MSH2 gene associated with hereditary nonpolyposis colorectal 
cancer (HNPCC). On the recommendation of his physician (a health care 
professional with appropriate training and expertise in the field of 
medicine involved), the individual undergoes a targeted genetic test to 
look for the specific mutation found in the family member of the 
individual to determine if the individual himself is at increased risk 
for cancer. The genetic test shows that the individual also carries the 
mutation but the individual's colonoscopy indicates no signs of disease 
and the individual has no symptoms. Because the individual has no signs 
or symptoms of colorectal cancer that could be used by the individual's 
physician to diagnose the cancer, HNPCC is not a manifested disease 
with respect to the individual. In contrast, if the individual 
undergoes a colonoscopy or other medical tests that indicate the 
presence of HNPCC, and the individual's physician makes a diagnosis of 
HNPCC, HNPCC is a manifested disease with respect to the individual.
     If a health care professional with appropriate expertise 
makes a diagnosis based on the symptoms of the patient, and uses 
genetic tests to confirm the diagnosis, the disease will be considered 
manifested, despite the use of genetic information. For example, if a 
neurologist sees a patient with uncontrolled movements, a loss of 
intellectual faculties, and emotional disturbances, and the neurologist 
suspects the presence of Huntington's disease, the neurologist may 
confirm the diagnosis with a genetic test. While genetic information is 
used as part of the diagnosis, the genetic information is not the sole 
or principal basis for the diagnosis, and, therefore, the Huntington's 
disease would be considered a manifested disease of the patient.
    As with the definition of ``genetic test,'' the Department declines 
to include these examples in the regulatory text as this is 
inconsistent with the approach generally taken in the HIPAA Privacy 
Rule. The Department intends to issue future guidance on its web site 
with respect to the Rule's protections for genetic information.
g. Definition of ``Health Plan''
Proposed Rule
    The Department proposed to make technical corrections to update the 
definition of ``health plan'' by revising and renumbering the 
definition to: Include specific reference to the Voluntary Prescription 
Drug Benefit Program under Part D of title XVIII of the Social Security 
Act, 42 U.S.C. 1395w-101 through 1395w-152; remove the specific 
reference to the Civilian Health and Medical Program of the Uniformed 
Services (CHAMPUS) (as defined in 10 U.S.C. 1072(4)), as this program 
is now part of the TRICARE health care program under title 10 of the 
United States Code, and revise the reference to the title 10 health 
care program accordingly to read more generally ``health care program 
for the uniformed services'' rather than ``health care program for 
active military personnel''; and reflect that Part C of title XVIII of 
the Social Security Act, 42 U.S.C. 1395w-21 through 1395w-28, is now 
called the Medicare Advantage program.

[[Page 5665]]

Overview of Public Comments
    The Department did not receive any comments on the proposed 
technical corrections to the definition of ``health plan.''
Final Rule
    The final rule incorporates the technical corrections to the 
definition.
4. Section 164.501--Definitions
    The Department proposed to modify Sec.  164.501 to add a definition 
of ``underwriting purposes'' and to make conforming changes to the 
definitions of ``payment'' and ``health care operations.''
a. Definition of ``Underwriting Purposes''
Proposed Rule
    Section 105 of GINA provides that the term ``underwriting 
purposes'' means, with respect to a group health plan, health insurance 
coverage, or Medicare supplemental policy: (A) Rules for, or 
determination of, eligibility (including enrollment and continued 
eligibility) for, or determination of, benefits under the plan, 
coverage, or policy; (B) the computation of premium or contribution 
amounts under the plan, coverage, or policy; (C) the application of any 
pre-existing condition exclusion under the plan, coverage, or policy; 
and (D) other activities related to the creation, renewal, or 
replacement of a contract of health insurance or health benefits.
    The Department proposed to adopt GINA's statutory definition of 
``underwriting purposes'' in Sec.  164.501 of the Privacy Rule, but 
also proposed to include certain clarifications for consistency with 
the regulations promulgated to implement the nondiscrimination 
provisions in sections 101 through 103 of GINA. In particular, the 
Department proposed to include a parenthetical to explain that the 
rules for, or determination of eligibility for, or determination of, 
benefits under the plan include changes in deductibles or other cost-
sharing mechanisms in return for activities such as completing a health 
risk assessment or participating in a wellness program. The proposed 
rule also included a parenthetical to make clear that the computation 
of premium or contribution amounts under the plan, coverage, or policy 
includes discounts, rebates, payments in kind, or other premium 
differential mechanisms in return for activities such as completing a 
health risk assessment or participating in a wellness program. Finally, 
we proposed a provision within the definition to clarify that 
``underwriting purposes'' does not include determinations of medical 
appropriateness where an individual seeks a benefit under the plan, 
coverage, or policy.
Overview of Public Comments
    About ten commenters addressed the proposed definition of 
``underwriting purposes.'' Four commenters generally supported the 
proposed definition. Other commenters expressed concern with the 
definition's inclusion of discounts, rebates, payments in kind, or 
other premium differential mechanisms in return for activities such as 
completing a health risk assessment (HRA) or participating in a 
wellness program. These commenters were concerned that prohibiting the 
use of genetic information, particularly family health history, for 
such purposes would have a detrimental impact on wellness and disease 
management programs. One commenter was concerned that the definition 
would prohibit dental insurance plans from offering preventive 
prognostic features to enrollees as part of the plan that test for 
susceptibility to dental decay and periodontal diseases. Enrollees that 
test positive would be provided with additional plan benefits as a 
supplement to the standard benefits to cover more aggressive preventive 
services. Finally, a few commenters were concerned that the broad 
definition of ``underwriting purposes'' would preclude plans from using 
HRAs and offering wellness programs even if no genetic information is 
requested or used. For example, one commenter was concerned that the 
definition would prohibit the use of ``personal habit'' information, 
such as information about smoking, or alcohol or drug use.
Final Rule
    The final rule adopts the proposed definition of ``underwriting 
purposes'' but moves the definition to within the underwriting 
prohibition at Sec.  164.502(a)(5)(i). This makes clear that the 
definition applies only for purposes of the prohibition on a health 
plan's use or disclosure of genetic information for underwriting 
purposes. As discussed more fully below with respect to the definition 
of ``health care operations,'' we move the definition of ``underwriting 
purposes'' and retain the term ``underwriting'' within the definition 
of ``health care operations'' in response to several public comments 
expressing concern that the proposed rule would no longer allow health 
plans to use or disclose any protected health information (i.e., even 
non-genetic information) for underwriting.
    The adopted definition is consistent with the definition 
promulgated in the interim final regulations to implement sections 101-
103 of GINA and with which compliance is already required by most 
health plans. We decline to exclude wellness programs and the use of 
HRAs from the definition because, as discussed in the interim final 
regulations issued by DOL, Treasury, and HHS, GINA Title I does not 
include an exception for wellness programs.\20\ However, we emphasize 
that health plans may continue to provide incentives for completing 
HRAs and participating in wellness programs in manners that do not 
involve the use or disclosure of genetic information. For example, 
``personal habit'' information about an individual, such as smoking 
status and alcohol and drug use, is not genetic information and thus, 
may be used by health plans for underwriting purposes. Further, DOL has 
issued guidance which makes clear that health plans may continue to 
collect family health history through the use of HRAs that are not tied 
to any reward.\21\
---------------------------------------------------------------------------

    \20\ See 74 FR 51669, footnote 12.
    \21\ See Q14 at https://www.dol.gov/ebsa/faqs/faq-GINA.html.
---------------------------------------------------------------------------

    In addition, the definition of ``underwriting purposes'' includes 
an exception for determinations of medical appropriateness where an 
individual seeks a benefit under the plan, coverage, or policy. Thus, 
to the extent that an individual is seeking a particular benefit under 
the plan and the health plan needs genetic information to determine the 
medical appropriateness of providing the benefit to the individual, the 
plan may use or disclose the minimum necessary genetic information to 
determine the medical appropriateness of providing the benefit. For 
example, if a health plan covers yearly mammograms for individuals 
under age 40 only in cases where the individual can demonstrate she is 
at increased risk for breast cancer, the plan can ask an individual 
under age 40 to provide the results of a genetic test or family health 
history and use such information to determine medical appropriateness 
prior to paying a claim for the mammogram. The medical appropriateness 
exception would also cover situations where a dental plan requires the 
results of a genetic test prior to offering a supplemental benefit for 
more aggressive preventive services to the extent the individual seeks 
such a benefit. For example, a dental plan may provide information to 
all of its enrollees about how to take advantage of

[[Page 5666]]

such a benefit, and when an enrollee contacts the plan about obtaining 
the benefit, may require the individual to take and provide the results 
of a genetic test to determine the medical appropriateness of providing 
the supplemental benefit to the individual.
b. Definition of ``Health Care Operations''
Proposed Rule
    The definition of ``health care operations'' at Sec.  164.501 
includes at paragraph (3) ``underwriting, premium rating, and other 
activities relating to the creation, renewal or replacement of a 
contract of health insurance or benefits * * *.'' To avoid confusion 
with the use of both ``underwriting'' and ``underwriting purposes'' in 
the Privacy Rule, and in recognition of the fact that the proposed 
definition of ``underwriting purposes'' includes activities that fall 
within both the definitions of ``payment'' and ``health care 
operations'' in the Rule, the Department proposed to remove the term 
``underwriting'' from the definition of ``health care operations.'' We 
also proposed to add the term ``enrollment'' to the express list of 
health care operations activities to make clear that the removal of the 
term ``underwriting'' would not impact the use or disclosure of 
protected health information that is not genetic information for 
enrollment purposes. These proposed revisions were not intended to be 
substantive changes to the definition and thus, health plans would be 
permitted to continue to use or disclose protected health information, 
except genetic information, for underwriting purposes.
Overview of Public Comments
    The Department received a few comments on the proposed revisions to 
the definition of ``health care operations.'' One commenter supported 
the inclusion of the word ``enrollment.'' A few commenters, however, 
expressed concern and confusion that the removal of the term 
``underwriting'' from the definition of ``health care operations'' 
would no longer permit uses or disclosures of even non-genetic 
protected health information for underwriting.
Final Rule
    Due to the confusion and concern expressed by the commenters 
regarding the removal of the term ``underwriting'' from the definition, 
we retain the term ``underwriting'' within the definition of ``health 
care operations'' at Sec.  164.501 However, to make clear that a health 
plan may continue to use or disclose only protected health information 
that is not genetic information for underwriting, we include a 
reference to the prohibition on using or disclosing genetic information 
for underwriting purposes within the definition. The final rule also 
retains the term ``enrollment'' within the definition because we 
believe it is helpful to clarify that this is a permitted health care 
operations activity.
c. Definition of ``Payment''
Proposed Rule
    The definition of ``payment'' in the Privacy Rule at Sec.  164.501 
includes activities, such as ``determinations of eligibility or 
coverage'' by a health plan, some of which may fall within the 
definition of ``underwriting purposes.'' To avoid any implication that 
a health plan would be permitted to use or disclose protected health 
information for ``payment'' purposes that are otherwise prohibited by 
the underwriting prohibition, we proposed to include a cross-reference 
in the definition of ``payment'' to the prohibition. Further, we 
believed the inclusion of such a cross-reference to be necessary to 
properly align the definition of ``payment'' in the Privacy Rule with 
the nondiscrimination provisions of GINA Title I and their implementing 
regulations. GINA provides a rule of construction at section 102(a)(2), 
which adds paragraph 2702(c)(3) of the PHSA, to make clear that health 
plans are not prohibited from obtaining and using the results of a 
genetic test in making determinations regarding payment, as such term 
is defined by the HIPAA Privacy Rule. Thus, the proposed exception 
would make clear that GINA's rule of construction regarding payment 
does not allow a health plan to use the results of genetic tests for 
activities that would otherwise constitute ``underwriting purposes,'' 
such as for determinations of eligibility for benefits.
Overview of Public Comments
    The Department received two comments on the proposed change to the 
definition of ``payment,'' one supporting the change and one indicating 
it is unnecessary.
Final Rule
    For the reasons described above, the final rule adopts the proposed 
change to the definition of ``payment.''
5. Section 164.502(a)--Uses and Disclosures of Protected Health 
Information: General Rules
a. Prohibition
Proposed Rule
    To implement section 105 of GINA, the Department proposed a new 
prohibition on health plans using or disclosing protected health 
information that is genetic information for underwriting purposes at 
Sec.  164.502(a)(3). We made clear that such a provision would operate 
notwithstanding the other provisions in the Privacy Rule permitting 
uses and disclosures, and proposed a conforming change to Sec.  
164.502(a)(1)(iv) to clarify further that an authorization could not be 
used to permit a use or disclosure of genetic information for 
underwriting purposes.
Overview of Public Comments
    Some commenters expressly supported the proposed modification to 
the Privacy Rule to include the prohibition, and the proposed 
clarification that an authorization cannot be used to otherwise permit 
a prohibited use or disclosure of genetic information. One commenter 
suggested adding the examples from the preamble to the regulatory text, 
as well as language to the regulatory text to clarify that the 
prohibition applies to genetic information obtained by a health plan 
prior to the passage of GINA.
Final Rule
    The final rule adopts the proposed prohibition on a health plan's 
use or disclosure of genetic information for underwriting purposes, 
except with regard to health plans that are issuers of long term care 
policies, as explained above in section VI.C.1 regarding to which plans 
the final rule applies. This prohibition, located in this final rule at 
Sec.  164.502(a)(5), applies to all genetic information from the 
compliance date of these modifications forward, regardless of when or 
where the genetic information originated. We do not believe a 
clarification of this fact in the regulatory text is necessary.
    Consistent with Sec. 101(a) of the statute, this prohibition should 
not be construed to limit the ability of a health plan to adjust 
premiums or contribution amounts for a group health plan based on the 
manifestation of a disease or disorder of an individual enrolled in the 
plan, even though a health plan cannot use the manifestation of a 
disease or disorder in one individual as genetic information about 
other group members and to further increase the premium for the plan. 
Similarly, for the individual

[[Page 5667]]

health insurance market, a health plan is not prohibited from 
establishing rules for eligibility for an individual to enroll in 
coverage or from adjusting premium or contribution amounts for an 
individual based on the manifestation of a disease or disorder in that 
individual or in a family member of such individual where such family 
member is covered under the individual's policy, even though the health 
plan cannot use the manifestation of a disease or disorder in one 
individual as genetic information about other individuals to further 
increase premiums or contribution amounts for those other individuals.
    To illustrate how the prohibition operates, we reiterate the 
following examples (but for the reasons explained above, decline to 
include them in the regulatory text). If a health insurance issuer, 
with respect to an employer-sponsored group health plan, uses an 
individual's family medical history or the results of genetic tests 
maintained in the group health plan's claims experience information to 
adjust the plan's blended, aggregate premium rate for the upcoming 
year, the issuer would be using protected health information that is 
genetic information for underwriting purposes in violation of Sec.  
164.502(a)(5)(i). Similarly, if a group health plan uses family medical 
history provided by an individual incidental to the collection of other 
information on a health risk assessment to grant a premium reduction to 
the individual, the group health plan would be using genetic 
information for underwriting purposes in violation of Sec.  
164.502(a)(5)(i).
    The prohibition is limited to health plans. A health care provider 
may use or disclose genetic information as it sees fit for treatment of 
an individual. If a covered entity, such as an HMO, acts as both a 
health plan and health care provider, it may use genetic information 
for purposes of treatment, to determine the medical appropriateness of 
a benefit, and as otherwise permitted by the Privacy Rule, but may not 
use such genetic information for underwriting purposes. Such covered 
entities, in particular, should ensure that appropriate staff members 
are trained on the permissible and impermissible uses of genetic 
information.
6. Section 164.504(f)(1)(ii)--Requirements for Group Health Plans
Proposed Rule
    Section 164.504(f)(1)(ii) permits a group health plan, or health 
insurance issuer or HMO with respect to the group health plan, to 
disclose summary health information to the plan sponsor if the plan 
sponsor requests the information for the purpose of obtaining premium 
bids from health plans for providing health insurance coverage under 
the group health plan, or for modifying, amending, or terminating the 
group health plan. As this provision permits activities that constitute 
``underwriting purposes,'' as defined by GINA and the proposed rule, 
the Department proposed to modify Sec.  164.504(f)(1)(ii) to clarify 
that Sec.  164.504(f)(1)(ii) would not allow a disclosure of protected 
health information that is otherwise prohibited by the underwriting 
prohibition.
Overview of Public Comments
    The Department received one comment in support of this 
modification.
Final Rule
    The final rule adopts the modification to Sec.  164.504(f)(1)(ii).
7. Section 164.506--Uses and Disclosures To Carry Out Treatment, 
Payment, or Health Care Operations
Proposed Rule
    Section 164.506(a) of the Privacy Rule sets out the uses and 
disclosures a covered entity is permitted to make to carry out 
treatment, payment, or health care operations. In light of the fact 
that the proposed definition of ``underwriting purposes'' encompasses 
activities that fall both within the definitions of ``payment'' and 
``health care operations'' under the Privacy Rule, the Department 
proposed to add a cross-reference in Sec.  164.506(a) to the new 
underwriting prohibition to make clear that Sec.  164.506 of the 
Privacy Rule would not permit health plans to use or disclose an 
individual's protected health information that is genetic information 
for underwriting, even though such a use or disclosure is considered 
payment or health care operations.
Overview of Public Comments
    The Department received one comment in support of this 
modification.
Final Rule
    The final rule adopts the modification to Sec.  164.506(a).
8. Section 164.514(g)--Uses and Disclosures for Activities Relating to 
the Creation, Renewal, or Replacement of a Contract of Health Insurance 
or Health Benefits
Proposed Rule
    Section 164.514(g) of the Privacy Rule prohibits a health plan that 
receives protected health information for underwriting, premium rating, 
or other activities relating to the creation, renewal, or replacement 
of a contract for health insurance or health benefits, from using or 
disclosing such protected health information for any other purpose 
(except as required by law) if the health insurance or health benefits 
are not placed with the health plan. The Department proposed conforming 
amendments to Sec.  164.514(g) to: (1) Remove the term ``underwriting'' 
to avoid confusion given the new definition of ``underwriting 
purposes,'' which encompasses the activities described above; and (2) 
make clear that a health plan that receives protected health 
information that is genetic information for the above purposes is not 
permitted to use or disclose such information for underwriting 
purposes. The proposed removal of the term ``underwriting'' from Sec.  
164.514(g) was not intended as a substantive change to the scope of the 
provision.
Overview of Public Comments
    One commenter suggested that the Department reconsider the removal 
of the term ``underwriting'' from this section as it could be viewed as 
a substantive change to the scope of the provision, and expressed 
concern that the modification would prohibit a health plan from using 
or disclosing genetic information as required by other law.
Final Rule
    The final rule modifies Sec.  164.514(g) to refer to the 
prohibition, now at Sec.  164.502(a)(5). However, as with the 
definition of ``health care operations,'' we do not remove the term 
``underwriting'' to avoid unnecessary confusion. We also clarify that a 
health plan may continue to use or disclose protected health 
information that is genetic information as required by other law, 
except to the extent doing so would be inconsistent with the 
prohibition in GINA and this final rule at Sec.  164.502(a)(5)(i) 
against using or disclosing genetic information for underwriting 
purposes.
9. Section 164.520--Notice of Privacy Practices for Protected Health 
Information
Proposed Rule
    As discussed above in Section IV with regard to the changes made to 
Sec.  164.520 pursuant to the HITECH Act, Sec.  164.520 of the Privacy 
Rule sets out the requirements for most covered entities to have and 
distribute a Notice of Privacy Practices (NPP). With respect to the 
NPP, the Department believes that

[[Page 5668]]

individuals should be informed of their new rights and protections 
under this rule with respect to genetic information in the health 
coverage context. Thus, the Department proposed in Sec.  
164.520(b)(1)(iii)(D) to require health plans that use or disclose 
protected health information for underwriting to include a statement in 
their NPP that they are prohibited from using or disclosing protected 
health information that is genetic information about an individual for 
such purposes. Without such a specific statement, individuals would not 
be aware of this restriction and the general statements regarding 
permitted uses and disclosures for treatment, payment, and health care 
operations in the NPP of a health plan that performs underwriting would 
not be accurate (i.e., the NPP would state that the health plan may use 
or disclose PHI for purposes of payment and health care operations, 
which would not be true with respect to genetic information when the 
use or disclosure is for underwriting purposes).
    The preamble explained that the proposed prohibition on using or 
disclosing genetic information for underwriting and the proposed 
requirement to explicitly include a statement regarding the prohibition 
would represent a material change to the NPP of health plans that 
perform underwriting, and the Privacy Rule requires at Sec.  
164.520(c)(1)(i)(C) that plans provide notice to individuals covered by 
the plan within 60 days of any material revision to the NPP. As in the 
NPRM issued to implement HITECH Act provisions, the Department 
requested comment on ways to inform individuals of this change to 
privacy practices without unduly burdening health plans and provided 
several possible alternatives. The Department also explained that the 
obligation to revise the NPP for the reasons described above would fall 
only on health plans that intend to use or disclose protected health 
information for activities that constitute ``underwriting purposes.'' 
Thus, health care providers, as well as health plans that do not 
perform underwriting, would not be required to revise their NPPs.
Overview of Public Comments
    One commenter supported informing individuals in the NPP that 
health plans are prohibited from using or disclosing genetic 
information for underwriting purposes. One commenter asked the 
Department to clarify that where a health plan has already made a 
change to the NPP to comply with a statute, such as with GINA, and has 
sent the revised NPP to members, the health plan would not be required 
to make another change to its NPP to comply with the regulation.
    A number of comments addressed the issue of the timing and manner 
of distributing revised NPPs. In general, commenters recommended 
various alternatives, including: (1) Require health plans to provide a 
revised NPP to members in the next annual mailing; (2) require health 
plans to provide either a revised NPP or a supplement to members in the 
next annual mailing and to post the revised NPP or supplement on the 
health plan Web site immediately; (3) retain the existing 60-day 
deadline for providing a revised NPP to individuals or provide for a 
30-day extension; and (4) allow for distribution via electronic 
processes for more efficient delivery of NPPs to members.
Final Rule
    The final rule adopts the requirement for health plans that perform 
underwriting to include in their NPPs a statement that they are 
prohibited from using or disclosing genetic information for such 
purposes, except with regard to issuers of long term care policies, 
which are not subject to the underwriting prohibition. Health plans 
that have already modified and redistributed their NPPs to reflect the 
statutory prohibition are not required to do so again, provided the 
changes to the NPP are consistent with this rule. We also modify the 
NPP distribution requirements for health plans where there are material 
changes. These modifications are discussed above in Section IV with 
regard to material changes to the NPP resulting from changes pursuant 
to the HITECH Act.
10. Other Comments
    Comment: One commenter requested clarification on preemption with 
regard to the new underwriting prohibition.
    Response: Pursuant to subpart B of Part 160 of the HIPAA 
Administrative Simplification Rules, to the extent that a provision of 
State law requires a use or disclosure of genetic information for an 
activity that would otherwise constitute ``underwriting purposes,'' 
such State law would be preempted by the Privacy Rule unless an 
exception at Sec.  160.203 applies. In contrast, State laws that 
provide greater privacy protection for genetic information than the 
Privacy Rule continue to remain in place.
    Comment: One commenter asked how a health care provider should 
ensure that releasing an individual's information to a health plan will 
not result in an inappropriate disclosure to the health plan for 
underwriting purposes. This commenter also asked what the rules are for 
access to protected health information about an individual by the 
individual's extended family members seeking to determine if they are 
affected by a genetic trait.
    Response: With respect to the first question, these rules do not 
apply to health care providers. A covered health provider may continue 
to disclose protected health information, including genetic 
information, where doing so meets the minimum necessary standard, to 
health plans for payment purposes. Under this Rule, the onus is on the 
health plan to not use or disclose protected health information it 
receives for such purposes for prohibited underwriting purposes. 
Further, health plans continue to be required by the Privacy Rule to 
limit requests of protected health information to the minimum necessary 
when requesting such information from other covered entities. The 
regulations implementing sections 101-103 of GINA also restrict the 
ability of health plans covered by those rules to request genetic 
information.
    With respect to the second question, to the extent that an 
individual's genetic information is needed for the treatment purposes 
of a family member, a covered health care provider is permitted to 
disclose such information, subject to any agreed-upon restriction, to 
another provider for the treatment of the family member. See FAQ 
512 at https://www.hhs.gov/ocr/privacy/hipaa/faq/right_to_request_a_restriction/512.html, which makes clear that a health care 
provider may share genetic information about an individual with 
providers treating family members of the individual who are seeking to 
identify their own genetic health risks, provided the individual has 
not requested and the health care provider has not agreed to a 
restriction on such disclosure.
    Comment: One commenter requested that the rule require that health 
plans conducting or sponsoring research involving genetic information 
provide research participants with an explicit statement to ensure the 
individuals understand that such information may not and will not be 
used for underwriting purposes.
    Response: We decline to require such a statement. The regulations 
implementing sections 101-103 of GINA already require a statement to 
that effect as a condition of the health plan requesting that a 
research participant undergo a genetic test as part of the research. 
See, e.g., 45 CFR 144.122(c)(5). Further, this rule requires that 
health plans that perform underwriting inform individuals through their 
NPPs that the

[[Page 5669]]

plans may not use or disclose genetic information for such purposes.
    Comment: One commenter asked that the HIPAA de-identification 
standard be strengthened to provide better protection for health 
information, including genetic information.
    Response: The Privacy Rule's de-identification standard is outside 
the scope of this rulemaking.

VII. Regulatory Analyses

A. Introduction

    We have prepared a regulatory impact statement in compliance with 
Executive Order 12866 (September 1993, Regulatory Planning and Review), 
Executive Order 13563 (January 2011, Improving Regulation and 
Regulatory Review), the Regulatory Flexibility Act (RFA) (September 19, 
1980, Pub. L. 96-354), the Unfunded Mandates Reform Act of 1995 (UMRA) 
(March 22, 1995, Pub. L. 104-4), and Executive Order 13132 on 
Federalism. We begin with a discussion of Executive Orders 12866 and 
13563 and then present a more detailed analysis of costs and benefits. 
Finally, relying on information explained in the cost-benefit analysis, 
we discuss issues related to the RFA, UMRA, and Federalism 
considerations.
1. Executive Order 12866 and Executive Order 13563
    Executive Orders 12866 and 13563 direct agencies to assess all 
costs and benefits of available regulatory alternatives and, if 
regulation is necessary, to select regulatory approaches that maximize 
net benefits (including potential economic, environmental, public 
health and safety effects, distributive impacts, and equity). Executive 
Order 13563 emphasizes the importance of quantifying both costs and 
benefits, of reducing costs, of harmonizing rules, and of promoting 
flexibility. A regulatory impact analysis must be prepared for major 
rules that have economically significant effects ($100 million or more 
in any one year) or adversely affect in a material way the economy, a 
sector of the economy, productivity, competition, jobs, the 
environment, public health or safety, or State, local, or Tribal 
government or communities (58 FR 51741). Based on the following 
analysis, this rule has been designated as an economically significant 
regulatory action within the meaning of section 3(f)(4) of Executive 
Order 12866. Accordingly, the rule has been reviewed by the Office of 
Management and Budget.
    To summarize, we estimate that the rule will result in new first-
year costs of between $114 million and $225.4 million. Annualizing the 
midpoints of our cost estimates at three and seven percent over ten 
years produces costs of $35.2 million and $42.8 million, 
respectively.\22\
---------------------------------------------------------------------------

    \22\ The breach notification provisions are the rule's only 
source of ongoing, annual costs. Therefore, with respect to breach, 
we annualize costs incurred on an annual basis. For the other 
provisions, we calculate annualized opportunity costs based on costs 
expended only in the first year of implementation.
---------------------------------------------------------------------------

    We estimate that the effects of the requirement for covered 
entities (including indirect costs incurred by third party 
administrators, which frequently send out notices on behalf of health 
plans) to issue new notices of privacy practices, as a result of the 
final changes to the HIPAA Privacy Rule under both the HITECH Act and 
GINA, will result in new costs of $55.9 million within 12 months of the 
effective date of the final rule. Annualizing the costs over 10 years 
at 3 percent and 7 percent results in annual NPP costs of approximately 
$6.6 million and $8 million, respectively. We have revised our cost 
estimate for NPP revisions since the proposed rule to reflect the 
increased flexibility provided in the final rule, which allows health 
plans to include their new NPPs in their usual, annual mailing rather 
than send them to individuals in a separate mailing. We also note that 
combining GINA and HITECH requirements into a single rule results in 
lower costs than would be incurred if covered entities were required to 
revise their NPPs multiple times to comply with separate rulemakings.
    Additionally, we have revised the annual estimated cost to comply 
with the final breach notification provisions. As we discuss below, we 
acknowledge there may still be some underreporting of breaches, however 
we do anticipate that the overall number of breaches will decrease in 
the future. As such, Table 2 below shows the costs of complying with 
the provisions of the breach notification final rule, which have been 
revised based on our experience with the number of breach notifications 
we have received from covered entities during calendar years 2010 and 
2011. We estimate the total annual cost for the breach notification 
rule to be approximately $14.5 million. Annualizing over 10 years at 3% 
and 7% produces annual breach implementation costs of approximately $17 
million and $20.6 million.
    With regard to the business associate provisions of the final rule, 
we assume that business associates currently comply with the HIPAA 
Privacy Rule use and disclosure provisions as required by their 
business associate contracts. However, with regard to the Security 
Rule, while we continue to believe that most business associates have 
implemented security protections that meet the Security Rule 
requirements as part of the assurances provided to covered entities 
through their contracts, we recognize that some smaller or less 
sophisticated business associates may not have engaged in the formal 
administrative safeguards required by the HIPAA Security Rule, and may 
not have written policies and procedures for compliance. For these 
business associates, we estimate that the costs to come into compliance 
with the Security Rule will be between approximately $22.6 million and 
$113 million. Annualizing the midpoint estimate ($67.8 million) at 3 
percent and 7 percent produces costs of $7.9 million and $9.7 million, 
respectively.
    Although we also continue to believe that most business associates 
have made a good faith attempt to conform their agreements with 
subcontractors to HIPAA requirements, we acknowledge the possibility 
that some business associates may make such efforts for the first time 
now that they and their subcontractors are subject to direct liability 
under the Rules. For this fraction of business associates, we estimate 
that the costs to bring subcontracts into compliance with the business 
associate agreement requirements will be between $21 million and $42 
million. Annualizing the midpoint of those estimates ($31.5 million) at 
3 percent and 7 percent results in costs of $3.7 million and $4.5 
million, respectively.
    There may be other costs we are not able to monetize because we 
lack data, and the rule may produce savings that may offset some or all 
of the added costs. We discuss these unquantified costs and benefits of 
the rule at the end of the Regulatory Impact Analysis.
    As a result of the economic impact, and other costs that are 
described but not quantified in the regulatory analysis below, OMB has 
determined that this rule is an economically significant regulatory 
action within the meaning of section 3(f)(4) of Executive Order 12866. 
We present our analysis of the costs and benefits of the rule in 
sections C and D below.
2. Entities Subject to the Rule
    This rule impacts covered health care providers, health insurance 
issuers, and third party administrators acting on behalf of health 
plans, which we estimate to total 698,238 entities. The rule also 
applies to approximately 1-2

[[Page 5670]]

million business associates and an unknown number of 
subcontractors.\23\
---------------------------------------------------------------------------

    \23\ Although we do not have data on the numbers of business 
associates, our enforcement experience leads us to believe that each 
covered entity has, on average, two to three business associates, 
for a total of 1-2 million business associates. This number likely 
overestimates the number of business associates, as some entities 
may be business associates to multiple covered entities. We do not 
have a basis for estimating the number of subcontractors that will 
be subject to the rule.
---------------------------------------------------------------------------

    Table 1 below shows the number of covered entities by class of 
provider and insurer that will be affected by the Rule.

                             TABLE 1--Number of Covered Entities by NAICS CODE \24\
----------------------------------------------------------------------------------------------------------------
                                                                                                    Estimated
                    NAICS                           Providers/suppliers           Number of      number of small
                                                                                  entities        entities \25\
----------------------------------------------------------------------------------------------------------------
622.........................................  Hospitals (General Medical and             4,060             4,060
                                               Surgical, Psychiatric,
                                               Substance Abuse, Other
                                               Specialty).
623.........................................  Nursing Facilities (Nursing               34,400            34,400
                                               Care Facilities, Residential
                                               Mental Retardation
                                               Facilities, Residential
                                               Mental Health and Substance
                                               Abuse Facilities, Community
                                               Care Facilities for the
                                               Elderly, Continuing Care
                                               Retirement Communities).
6211-6213...................................  Office of MDs, DOs, Mental               419,286           419,286
                                               Health Practitioners,
                                               Dentists, PT, OT, ST,
                                               Audiologists.
6214........................................  Outpatient Care Centers                   13,962            13,962
                                               (Family Planning Centers,
                                               Outpatient Mental Health and
                                               Drug Abuse Centers, Other
                                               Outpatient Health Centers,
                                               HMO Medical Centers, Kidney
                                               Dialysis Centers,
                                               Freestanding Ambulatory
                                               Surgical and Emergency
                                               Centers, All Other Outpatient
                                               Care Centers).
6215........................................  Medical Diagnostic, and                    7,879             7,879
                                               Imaging Service Covered
                                               Entities.
6216........................................  Home Health Service Covered               15,329            15,329
                                               Entities.
6219........................................  Other Ambulatory Care Service              5,879             5,879
                                               Covered Entities (Ambulance
                                               and Other).
N/A.........................................  Durable Medical Equipment                107,567           107,567
                                               Suppliers \26\.
4611........................................  Pharmacies \27\...............            88,396            88,396
524114......................................  Health Insurance Carriers \28\               730               276
524292......................................  Third Party Administrators                   750               750
                                               Working on Behalf of Covered
                                               Health Plans \29\.
                                                                             -----------------------------------
    Total Entities..........................  ..............................           698,238           697,784
----------------------------------------------------------------------------------------------------------------

     
---------------------------------------------------------------------------

    \24\ Office of Advocacy, SBA, https://www.sba.gov/advo/research/data.html.
    \25\ Because the vast majority of covered providers are small 
entities, we include all providers in our estimates of small 
providers.
    \26\ Centers for Medicare & Medicaid Services covered entities.
    \27\ The Chain Pharmacy Industry https://www.nacds.org/wmspage.cfm?parm1=507.
    \28\ Source: HHS ASPE analysis of 2010 NAIC Supplemental Health 
Care Exhibit data.
    \29\ We include third party administrators in our count of 
covered entities, although they are business associates, because the 
nature of their representation of the majority of ERISA plans makes 
them an appropriate ``surrogate'' for those plans.
---------------------------------------------------------------------------

B. Why is this rule needed?

    This final rule is needed to strengthen and expand the privacy and 
security protections for individuals' health information and privacy 
rights established under the HIPAA, as mandated by the HITECH Act and 
GINA. These enhancements are necessary to ensure continued adequate 
protections for health information, as well as trust in the health care 
system, particularly as the adoption and use of electronic health 
records increases. Importantly, among other changes, the rule makes 
business associates of covered entities directly liable for Federal 
penalties for failures to comply with certain provisions of the rule. 
This expansion in liability closes a large gap in protection that 
existed prior to these modifications with respect to business 
associates, which are the cause of many of the security breaches for 
which the Department receives breach reports.
    The final rule also lays out standards for when individuals and the 
Secretary must be informed that a breach of protected health 
information has occurred so that individuals may take measures to 
protect themselves from risks associated with the breach. By 
establishing requirements for notifying individuals and making business 
associates directly liable for complying with certain provisions of the 
Privacy and Security rules, we expect the number of breaches of 
protected health information to decline over time.
    This final rule also makes changes to the HIPAA rules, such as 
those that streamline the research authorization process, that are 
designed to increase flexibility for, and decrease burden on, the 
regulated entities, as well as to harmonize certain requirements with 
those under the Department's Human Subjects Protections regulations.

C. Costs

1. Breach Notification Costs
    The preamble to the interim final rule published on August 24, 
2009, contained a regulatory impact statement estimating the economic 
burden of implementing the rule. We are revising that impact statement 
in this final rule based upon our experience with collecting breach 
notifications from covered entities during calendar years 2010 and 
2011.
    The analysis that follows is very similar to the analysis set forth 
in the preamble to the interim final rule; however, instead of using 
information

[[Page 5671]]

from https://www.datalossdb.org to estimate the number of breaches that 
would occur each year, we have used the breach notifications provided 
to the Secretary during calendar years 2010 and 2011 to project the 
ongoing, annual costs to covered entities for implementing the breach 
notification provisions. Several commenters noted that significantly 
more breaches would occur each year than the interim final rule 
anticipated, and we acknowledge that the estimates provided in the 
interim final rule were significantly lower than our experience has 
been to date. As such, we believe that relying on our experience 
receiving notifications addresses the concerns of the commenters who 
thought we were underestimating the number of breaches that would occur 
each year. Based upon this information, we have revised the projected 
annual cost to implement these breach notification provisions.
    We acknowledge that there may still be some underreporting of 
breaches as the obligations of the regulation may not yet have 
penetrated down to all covered entities and business associates. At the 
same time, we expect that some types of incidents being reported today 
may not in the future as covered entities and business associates 
become more familiar with the definition of breach and more adept at 
performing risk assessments and determining whether a breach has 
occurred. We have received breach notifications from covered entities 
in several situations in which notification was not necessary, such as 
where there was no underlying impermissible use or disclosure under the 
Privacy Rule or where one of the exceptions to breach clearly applied 
to the situation. This is the type of over-reporting that we expect to 
diminish in the future. Additionally, covered entities and business 
associates are beginning to recognize areas of potential weakness and 
to take systemic actions to prevent breaches from occurring in the 
future, such as encrypting portable devices to avoid having to provide 
breach notifications in the event the device is lost or stolen.
    Table 2 shows the costs of the provisions of the final rule based 
on the breach notifications we have received from covered entities 
during calendar years 2010 and 2011. We also present the costs required 
for investigating breaches and the amount of time we anticipate 
individuals will spend calling the toll-free number for substitute 
notice. We estimate the total cost for the breach notification rule to 
be approximately $14.5 million. Discounting at 3 percent and 7 percent 
and annualizing over 10 years results in costs of $17 million and $20.6 
million, respectively.

               Table 2--Summary of Annual Compliance Cost for Breach Notification in 2011 Dollars
----------------------------------------------------------------------------------------------------------------
                                                     Number of
          Cost elements              Number of       affected       Cost/breach    Cost/affected       Cost
                                     breaches       individuals                     individuals
----------------------------------------------------------------------------------------------------------------
E-mail and 1st Class Mail.......          19,000       6,710,000            $182          $0.517      $3,467,122
Substitute Notices: Media Notice           1,190       6,605,500             480           0.086         571,200
Substitute Notices: Toll-Free              1,190    \30\ 660,550           1,526           2.750       1,816,379
 Number.........................
Imputed cost to affected                   1,190         660,550           1,725           3.108       2,052,665
 individuals who call the toll-
 free line......................
Notice to Media of Breach: Over              250       6,600,000              62           0.002          15,420
 500............................
Report to the Secretary: 500 or              250       6,600,000              62           0.002          15,420
 More...........................
Investigation Costs: Under 500..          18,750         324,050             281           16.29       5,277,456
Investigation Costs: 500 or More             250       6,600,000           3,350           0.127         837,500
Annual Report to the Secretary:           18,750         110,000              23            3.84         422,438
 Under 500......................
                                 -------------------------------------------------------------------------------
    Total Cost..................  ..............  ..............  ..............  ..............      14,475,600
----------------------------------------------------------------------------------------------------------------
\30\ As we explain below in the section on substitute notice, we project that 6,605,500 individuals will be
  affected by breaches that may require substitute notice, but we expect that at most 10% of affected
  individuals will call the toll-free line for information.

    In this revised analysis, we rely entirely on our experience with 
breach notifications received by the Secretary during calendar years 
2010 and 2011, for projecting the ongoing, annual costs of the breach 
notification rule. Based on our experience in those years, we project 
the likely number of breaches, number of affected individuals, and 
costs associated with this regulation. We have not attempted to predict 
future costs because, as discussed above, while we anticipate the 
overall number of breaches and the overall costs of implementing the 
breach notification provisions to fall over time, we do not currently 
have enough data to establish such a trend.
Affected Entities
    The entities affected by the breach notification regulation are 
outlined in the impact statement of the interim final rule. HIPAA 
covered entities and their business associates must comply with these 
regulations. We estimate that approximately 700,000 HIPAA covered 
entities will be subject to the final rule, although many fewer will 
experience a breach requiring them to fulfill the breach notification 
requirements.
How many breaches will require notification?
    Although this final rule modifies the definition of breach at Sec.  
164.402 to remove the harm standard, we do not believe that this will 
have a significant effect on the number of breaches reported to HHS or 
on the number of individuals affected. As discussed in Section V above, 
this final rule removes the harm standard and implements a more 
objective risk assessment for evaluating whether an impermissible use 
or disclosure is a breach. As a result, covered entities must still 
perform a risk assessment following an impermissible use or disclosure 
of protected health information to determine the probability that the 
protected health information has been compromised. Events such as 
hacking into an unencrypted database and theft of unsecured protected 
health information would in almost all cases constitute a breach in 
this final rule, just as they would under the interim final rule's 
definition of breach. However, given the further clarity in this rule 
as to the standard and factors to be considered, other incidents that 
may not have been considered a breach under the interim final rule may 
be considered a breach under this final rule (or in some cases, vice 
versa).
    Instead of relying on data from https://www.datalossdb.org to 
estimate the number of breaches and the number of individuals affected 
by such breaches

[[Page 5672]]

each year, this final rule uses breach notification reports submitted 
to the Secretary by covered entities to revise our previous estimates. 
We believe these reports provide us with much more complete information 
from which to project the overall cost of implementing this regulation.
    Beginning September 23, 2009, covered entities were obligated to 
notify the Secretary of all breaches of protected health information 
occurring on or after that date. As of September 23, 2009, covered 
entities must report breaches affecting 500 or more individuals to the 
Secretary without unreasonable delay and in no case later than 60 days 
from discovery of the breach, while breaches affecting fewer 
individuals must be reported to the Secretary within 60 days of the end 
of the calendar year in which the breach occurred.
    Based on our experience receiving breach notifications during 
calendar years 2010 and 2011, we project that HHS will receive 
approximately 19,000 breach notifications from covered entities 
annually or, on average, approximately 1,583 breach notifications each 
month. Approximately 250 such notifications will report breaches 
affecting 500 or more individuals and the remaining 18,750 reported 
breaches will affect fewer than 500 individuals.
    We project that approximately 6.71 million individuals will be 
affected by the 19,000 breaches reported to HHS each year, which is, on 
average, roughly 353 affected individuals per breach.
    As in the interim final rule, we have assumed that no State has a 
notification requirement, despite the fact that this will overestimate 
the burden imposed on covered entities because covered entities have 
trained their staffs and have prepared procedures to follow when a 
breach occurs to comply with existing breach notification requirements 
of most of the States. To ameliorate the overstatement of our cost 
estimate somewhat, we have assumed the costs for training personnel and 
for developing procedures for the most part have already been expended 
and are therefore in the baseline. We did not include these costs in 
our analysis of the annual costs.
    We have followed the same approach to estimating the costs as 
outlined in the interim final rule. We examined the cost of notifying 
affected individuals by first class mail, issuing substitute notice in 
major media or on a Web site along with a toll-free phone number, 
notifying prominent media in the event of a breach involving more than 
500 individuals, and notifying the Secretary of a breach, as well as 
the costs of investigating and documenting breaches. Some commenters 
requested that we include the cost of modifying contracts with business 
associates to potentially define the breach notification obligations 
between the parties. We note that costs to modify business associate 
agreements generally to comply with the new HITECH provisions are 
discussed elsewhere in this impact analysis.
Cost of Notifying Affected Individuals by First Class Mail or Email
    Section 164.404 requires all covered entities to notify affected 
individuals of a breach either by first class mail, or if the 
individual has agreed, by email. In the interim final rule, we assumed 
that approximately one half of notices sent to affected individuals 
would be sent via first-class mail, while the rest would be sent via 
email. By comparison, in the Federal Trade Commission's (FTC) final 
breach notification rule, the FTC assumed that 90 percent of the 
notices sent to individuals affected by a breach requiring notification 
under the FTC rule would be emailed and only 10 percent would be sent 
by regular first class mail. Since the firms that the FTC regulates are 
primarily web-based, assuming that the vast majority of communications 
would be conducted through email is a reasonable assumption. For HIPAA 
covered entities, however, 90 percent of which are small businesses or 
nonprofit organizations that engage the entire U.S. population in 
providing health care services, we believed that notification through 
email would be much more limited than in the case of the entities the 
FTC regulates. Some physician offices have been slow to adopt email 
communication with their patients for various reasons. We, therefore, 
assumed that only 50 percent of individuals affected as a result of a 
breach of unsecured protected health information would receive email 
notices. As we did not receive any comments on this assumption, we 
retain it here.
    As discussed in our analysis in the interim final rule, there will 
be certain costs that both email and first-class mail notification will 
share. The cost of drafting and preparing the notice will apply to both 
forms. The median hourly wage for the labor category of a healthcare 
practitioner and technical worker in 2011 was approximately $42.96, 
including 50 percent for fringe benefits.\31\ If we assume 30 minutes 
per breach for composing the letter, the cost equals $21.48. We assume 
that it will also take 30 minutes per breach for an administrative 
assistant to prepare the letter in either email or printed formats and 
to document the letter to comply with Sec. Sec.  164.414(a) and 
164.530(j). The median hourly wage for office and administrative 
support staff is $22.53, including 50 percent for benefits. For the 30 
minutes, we estimate $11.27 per breach. The combined labor cost for 
composing and preparing the document is approximately $32.75 per 
breach. Half of this cost will be allocated to the first-class letter 
and the other half to the emails.
---------------------------------------------------------------------------

    \31\ Department of Labor, Occupational Employment Statistics; 
Healthcare Practitioner and Technical Occupations. Available at 
https://www.bls.gov/oes/current/oes_nat.htm.
---------------------------------------------------------------------------

    Although computer costs for sending email will be insignificant, it 
will take staff time to select the email address from the entity's 
mailing list. We assume that an office worker could process and send 
200 emails per hour at a cost of $22.53 per hour. For each mailed 
notice, we assume $0.06 for paper and envelope and $0.45 for a first 
class stamp, totaling $0.51 per letter. We estimate another $22.53 per 
hour to prepare the mailing by hand at a rate of 100 letters per hour.
    Based on our revised estimate of the number of breaches that will 
occur in a year, we can multiply the number of breaches by the cost of 
composing and preparing a notice (19,000 x $32.75) equals $622,250. 
Allocating half the costs to emailing and the same amount to regular 
mail yields $311,125 to each category.
    Splitting our estimate of the number of affected individuals evenly 
between email and regular mail gives us 3,355,000 affected individuals 
for each notice category. As we did in the interim final rule, for 
emails we divide affected individuals by the number of emails processed 
in an hour (200) and multiply the result (16,775 hours) by the hourly 
cost of $22.53, giving us $377,940. To this number we add the $311,125 
giving us an estimated cost for email notices of $689,066.
    We follow the same method for estimating the cost of mailing 
notices using postal mail plus the cost of postage and supplies. 
Dividing 100 letters per hour into 3,355,000 yields 33,550 hours, which 
is then multiplied by $22.53 to reach $755,882 in labor costs to 
prepare the mailing. Adding to that the costs of postage and supplies 
($1,711,050) and the costs of composing and drafting ($311,125) equals 
$2,778,057. Summing the cost of email and postal mail notices equals

[[Page 5673]]

$3,467,122. Table 3 presents the results of our analysis in the order 
they are discussed above.

              Table 3--Cost of E-Mail and First Class Mail to Affected Individuals in 2011 Dollars
----------------------------------------------------------------------------------------------------------------
            (Annual)                           Mail                          Email                    Total
----------------------------------------------------------------------------------------------------------------
Number of breaches..............  9,500........................  9,500........................            19,000
Number of affected individuals    3,355,000....................  3,355,000....................         6,710,000
 or records.
Hours to compose and document     9,500 (1 hr per breach)......  9,500 (1 hr per breach)......            19,000
 notice.
Cost to compose and document      $311,125.....................  $311,125.....................          $622,250
 notice.
Hours to prepare mailing........  33,550.......................  16,775.......................            50,325
Cost to prepare mailing.........  $755,882.....................  $377,940.....................        $1,133,822
Postage and supplies............  $1,711,050...................  N/A..........................        $1,711,050
                                 -------------------------------------------------------------------------------
    Total.......................  $2,778,057...................  $689,066.....................        $3,467,122
----------------------------------------------------------------------------------------------------------------

Cost of Substitute Notice
    In the event that a HIPAA covered entity is not able to contact an 
affected individual through email or postal mail, it must attempt to 
contact the person through some other means. If the number of 
individuals who cannot be reached through the mailings is less than 
ten, the entity may attempt to reach them by some other written means, 
or by telephone.
    In the event that the covered entity is unable to contact 10 or 
more affected individuals through email or postal mail, the rule 
requires the entity to (1) publish a notice in the media (newspaper, 
television, or radio) or post a notice on its Web site, containing the 
same information contained in the mailed notice, and (2) set up a toll-
free number. The toll-free number is to be included in the media notice 
or notice on the Web site.
    Based on the breach notification reports received by the Secretary 
during calendar years 2010 and 2011, we project that approximately 
1,190 breaches affecting 10 or more individuals will require substitute 
notice (including 5% of breaches involving fewer than 500 individuals, 
and all 250 breaches involving 500 or more individuals). While several 
breaches affecting only 1 individual have also required substitute 
notice, as stated in the interim final rule, we believe the costs for 
notifying fewer than 10 individuals through alternative written means 
or by telephone would be very small and as a result we have not 
attempted to estimate those costs.
    The interim final rule estimated that it would cost approximately 
$240 to publish a public notice in a newspaper. Assuming the covered 
entity will publish two notices, the cost is $480. Multiplying this 
amount by the 1,190 estimated breaches yields $571,200. Also, as noted 
in the interim final rule, if a HIPAA covered entity has a Web site, we 
assume there will be no cost to post the notice to the Web site. We 
believe this overestimates the overall cost of publishing a notice, as 
many covered entities will elect to post the public notice only on 
their Web site, and not in a newspaper.
    As outlined in the interim final rule, the cost of setting up a 
toll-free phone number is a straight forward process of contacting any 
one of a number of service providers who offer toll-free service. The 
interim final rule found that the prices for toll-free service range 
from $0.027 per minute for a basic mail box arrangement to $0.07 per 
minute. A major, national phone service company offers toll-free 
service for $15 per month per toll-free number and per minute charge of 
$0.07. There is a one-time charge of $15. As in the interim final rule, 
we use the costs of $15 per month plus $15 activation fee and $0.07 per 
minute.
    Since the regulation requires providers to maintain a toll-free 
number for three months, the monthly charge plus initial fee per breach 
will be $60. To estimate the number of calls to the toll-free number, 
the interim final rule assumed that more individuals than those 
affected by the breach requiring substitute notice would call out of 
concern that their protected health information might have been 
compromised. The interim final rule estimated that a number equal to 
all affected individuals of all breaches would call the toll-free 
number. Based on our experience to date, and given that many 
individuals involved in breaches requiring substitute notice will 
receive regular notice, we now assume that less than 10 percent of 
individuals affected by breaches requiring substitute notice will call 
the toll-free line. Therefore, as we anticipate 6,605,500 total 
individuals will be affected by breaches requiring substitute 
notice,\32\ we assume that no more than 10 percent, or 660,550, will 
call the toll-free number to determine if they are affected by the 
breach. We note that while this revision significantly reduces the 
overall cost to covered entities for providing substitute notice in 
situations in which there is insufficient or out-of-date contact 
information for 10 or more individuals, we believe this estimate is 
much more appropriate based on the information we have received from 
covered entities thus far.
---------------------------------------------------------------------------

    \32\ This number includes all individuals affected by breaches 
involving 500 or more individuals (6,600,000) and 5 percent of 
individuals affected by breaches involving less than 500 individuals 
(5,500).
---------------------------------------------------------------------------

    Using this number and assuming that a call averages five minutes at 
$0.07 per minute, we estimate the total direct calling costs to equal 
$231,193. Added to this is $345,000 that represents the monthly fee per 
breach (1,190 breaches) for three months plus the one-time fee 
(totaling $60 per breach). This brings the total cost of setting up and 
maintaining toll-free lines to $576,193.
    To this cost, we must also include the office staff time to answer 
the incoming calls at $22.53 per hour. Based on an average of five 
minutes per call, a staff person could handle 12 calls per hour. 
Dividing 12 into 660,550 equals approximately 55,046 hours and then 
multiplied by $22.53 equals $1,240,186. Summing all cost elements 
yields a total cost of $1,816,379.
    To the degree that entities already maintain toll-free phone lines, 
our estimate overstates the costs of setting up a toll-free line as 
required under the rule. Table 4 presents our cost analysis for the 
toll-free line.

[[Page 5674]]



              Table 4--Annual Cost for Setting Up a Toll-Free Line for Three Months in 2011 Dollars
----------------------------------------------------------------------------------------------------------------
                                                     Number of
                                                     breaches        Number of
                      Costs                          affecting    breaches 500 +     Number of         Total
                                                  fewer than 500       (250)           calls
                                                      (5,500)
----------------------------------------------------------------------------------------------------------------
Monthly Charges for 3 months + 1-time Charge            $330,000         $15,000             N/A        $345,000
 ($60/breach)...................................
Direct Calling Charges @ $.07/min x 5 minutes...  ..............  ..............         660,550        $231,193
Labor cost @ $22.53/hr x 5 min per call.........  ..............  ..............         660,550      $1,240,186
Cost to individuals @ $24.86/hr x 7.5 min per     ..............  ..............         660,550      $2,052,665
 call...........................................
                                                 ---------------------------------------------------------------
    Total.......................................  ..............  ..............  ..............      $3,869,044
----------------------------------------------------------------------------------------------------------------

    As in the interim final rule, we have also imputed a cost to the 
time individuals will spend calling the toll-free number. In estimating 
the time involved, we assumed that a person will spend five minutes per 
call. However, the person may not get through the first time and thus 
may have to call back a second time which could add another 5 minutes. 
Taking the average between 5 and 10 minutes, we used an average time of 
7.5 minutes per caller.
    For purposes of imputing cost to an individual's time, we took the 
median compensation amount from the Bureau of Labor Statistics of 
$24.86 \33\ for all occupations. Dividing 60 by 7.5 minutes yields 8 
calls per hour. Dividing the number of calls per hour into 660,550 
calls and then multiplying by $24.86, gives us a cost of $2,052,665.
---------------------------------------------------------------------------

    \33\ Department of Labor, Occupational Employment Statistics. 
https://www.bls.gov/oes/current/oes_nat.htm.
---------------------------------------------------------------------------

Cost of Breaches Involving More Than 500 Individuals
    If a covered entity experiences a breach of protected health 
information affecting more than 500 individuals of a State or 
jurisdiction, Sec.  164.406 of the rule requires the entity to notify 
the media in the jurisdiction or State in which the individuals reside. 
In addition, Sec.  164.408 of the rule requires the entity to notify 
the Secretary contemporaneously with notice to affected individuals in 
cases where 500 or more individuals are affected by a breach.
    As stated in the interim final rule, we anticipate that a covered 
entity will issue a press release when it must notify the media under 
Sec.  164.406. The tasks involved in issuing the press release will be 
the drafting of the statement and clearing it through the entity. As 
discussed in the interim final rule, we assume that drafting a one-page 
statement will contain essentially the same information provided in the 
notice to affected individuals and will take 1 hour of an equivalent to 
a GS-12 Federal employee, earning $29 per hour. Adding 50 percent to 
account for benefits equals $43.50. Approval of the release involves 
reading the document. We expect this activity to take 15 minutes. The 
median hourly rate for a public relations manager is approximately 
$44.86 in 2011.\34\ Adding 50 percent for benefits equals $67.29, so 
one quarter of an hour equals $16.82 for approving the release. The 
total cost of the release equals $61.68, and multiplying this amount by 
the number of breaches affecting more than 500 individuals (250) equals 
$15,420. This amount is lower than our previous estimate because we 
have adopted the more customary and realistic approach of adding 50 
percent to wages for benefits, rather than doubling standard wage rates 
to account for benefits. It should be noted that even this amount may 
overstate the actual costs of issuing a notice to the media.
---------------------------------------------------------------------------

    \34\ https://www.bls.gov/oes/current/oes_nat.htm.
---------------------------------------------------------------------------

    The report to the Secretary that must be sent contemporaneously 
with the sending of the notices to the affected individuals will 
contain essentially the same information as the notice sent to the 
affected individuals. As stated in the interim final rule, we 
anticipate the time and cost to prepare the report will be the same as 
that required for issuing a notice to the media. The cost for reporting 
to the Secretary the 250 breaches affecting 500 or more individuals is 
$15,420.
Cost of Investigating a Breach
    As a prerequisite to issuing a notice to individuals, to the media, 
and to the Secretary, the covered entity will need to conduct an 
investigation to determine the nature and cause of the breach. We 
estimate that the 95 percent of breaches in the under 500 category that 
affect fewer than 10 individuals will require 4 hours of investigation. 
The other 5 percent of under 500 breaches, which affect between 10 and 
499 individuals, may require up to 8 hours to investigate. At an office 
manager's \35\ time at $67 per hour ($44.65 median wage plus 50 percent 
for benefits) multiplied by 4 and 8 hours, results in per breach costs 
of approximately $268 and $536, respectively. Multiplying $268 by the 
number of breaches affecting fewer than 10 individuals (17,800 
breaches) results in investigation costs of $4,773,616. We then 
multiply $536 by the number of breaches affecting 10 to 499 individuals 
(940 breaches), which produces investigation costs of $503,840. Adding 
the totals for the two groups results in investigation costs of 
$5,277,456 per year for breaches affecting less than 500 individuals. 
This estimate includes the time required to produce the documentation 
required by Sec.  164.414(a). We note that this estimate is 
significantly higher than that in the interim final rule; however, this 
is due entirely to the revised estimate that there will be 
approximately 18,750 breaches affecting fewer than 500 individuals per 
year.
---------------------------------------------------------------------------

    \35\ See www.bls.gov/oes/current/oes_nat.htm for All Management 
Occupations.
---------------------------------------------------------------------------

    As stated in the interim final rule, for breaches involving 500 or 
more individuals, the breach investigation may take up to 100 hours to 
complete; however, we assume that the average investigation will take 
only 50 hours. At an office manager's time of $67 per hour multiplied 
by 50 hours, this cost equals $3,350 per breach. Multiplying this by 
the number of breaches (250) yields $837,500.
Cost of Submitting the Annual Breach Summary to HHS
    Under Sec.  164.408, covered entities must notify the Secretary of 
all breaches; however, covered entities reporting breaches affecting 
fewer than 500 individuals may report these breaches to the Secretary 
annually. Since the material for the submission has already been 
gathered and organized for the issuance of the notices to the affected 
individuals, we expect that notifying the Department will require at

[[Page 5675]]

most an hour of office staff time once per year. At $22.53 per hour 
multiplied by the total number of breaches (18,750) affecting fewer 
than 500 individuals, this cost equals $422,438.
2. Notifying Individuals of Their New Privacy Rights
    Covered entities must provide individuals with NPPs that detail how 
the covered entity may use and disclose protected health information 
and explain individuals' rights with respect to their own health 
information. Because of changes to the HIPAA Rules as a result of the 
HITECH Act and GINA, the final rule requires covered entities to modify 
their NPPs and distribute them to individuals to advise them of the 
following: (1) For health plans that underwrite, the prohibition 
against health plans using or disclosing PHI that is genetic 
information about an individual for underwriting purposes; (2) the 
prohibition on the sale of protected health information without the 
express written authorization of the individual, as well as the other 
uses and disclosures for which the rule expressly requires the 
individual's authorization (i.e., marketing and disclosure of 
psychotherapy notes, as appropriate); (3) the duty of a covered entity 
to notify affected individuals of a breach of unsecured protected 
health information; (4) for entities that have stated their intent to 
fundraise in their notice of privacy practices, the individual's right 
to opt out of receiving fundraising communications from the covered 
entity; and (5) the right of the individual to restrict disclosures of 
protected health information to a health plan with respect to health 
care for which the individual has paid out of pocket in full.
    For providers, the costs related to the NPP consist of developing 
and drafting the revised NPP, and, as discussed below, the potential to 
incur out-of-cycle printing costs for the revised notice. There are no 
new costs attributable to the distribution of the revised notice as 
providers have an ongoing obligation to hand out the NPPs when first-
time patients come for their appointments. We estimate that drafting 
the updated NPPs will require approximately one-third of an hour of 
professional, legal time at a cost of about $28.\36\ The total cost for 
attorneys for the approximately 697,000 \37\ health care providers in 
the U.S. is, therefore, expected to be approximately $20 million. 
Printing the NPPs involves production and supplies at a cost of $0.10 
per notice. Based on our prior estimates, health care providers are 
currently required to print and provide the NPP to approximately 613 
million new patients annually. We assume that most health care 
providers will spread the printing of their notices throughout the 
year, producing copies on a quarterly, monthly, or even more frequent 
schedule. Further, providers will have 8 months from the publication of 
the final rule before they will need to produce the revised NPPs, and, 
therefore, can use that time to adjust their inventory and printing 
schedule to transition to the revised notice without any additional 
expense. Thus, assuming a worst case scenario in which all providers 
would need to replace at most 4 months of old inventory with the 
revised notice, the need for off-schedule printing of the revised 
notice for this 4 month period would be attributed to this provision. 
We estimate, therefore, that providers will print not more than 204 
million revised NPPs over and above their existing printing obligations 
(4/12 x 613 million = 204 million). Printing costs for 204 million NPPs 
will be $20.4 million (204 million x $0.10 = $20.4 million). Therefore, 
the total cost for providers is approximately $40.4 million ($20 
million + $20.4 million = $40.4 million).
---------------------------------------------------------------------------

    \36\ See https://www.bls.gov/oes/current/naics3_541000.htm#23-0000 for lawyers. Note that we generally calculate labor costs based 
on the median hourly rate, which for lawyers is $56.21 per hour. We 
add 50 percent to account for fringe benefits, resulting in an 
estimated hourly cost of $84.32.
    \37\ We identified 698,238 entities that must prepare and 
deliver NPPs that are shown in Table 1 above. This includes 696,758 
HIPAA covered entities that are health care providers, including 
hospitals, nursing facilities, doctor offices, outpatient care 
centers, medical diagnostic, imaging service, home health service 
and other ambulatory care service covered entities, medical 
equipment suppliers, and pharmacies. For the purposes of our 
calculation, we have rounded this number to 697,000. Table 1 also 
includes 730 health insurance carriers and 750 third party 
administrators working on behalf of covered health plans. The cost 
estimates for these entities are addressed later.
---------------------------------------------------------------------------

    For health plans, the costs related to the NPP consist of 
developing and drafting the revised NPP, and, for certain health plans, 
the costs of printing and mailing the notice out-of-cycle because the 
revision is a material change. See Sec.  164.520(c)(1)(v)(A). With the 
exception of a few large health plans, most health plans do not self-
administer their plans. Most plans are either health insurance issuers 
(approximately 730) or utilize third party administrators that act on 
their behalf in the capacity of business associates. We identified 
approximately 750 third party administrators acting as business 
associates for ERISA plans. We have revised our earlier estimate of 
3,500 third party administrators after learning that the majority of 
these entities act as welfare administrators and do not administer 
health plans. In addition, some public non-Federal health plans may use 
third party administrators. Almost all of the public and ERISA plans, 
we believe, employ third party administrators to administer their 
health plans. While the third party administrators will bear the direct 
costs of issuing the revised NPPs, the costs will generally be passed 
on to the plans that contract with them. Those plans that self-
administer their own plans will also incur the costs of issuing the 
revised NPPs. We do not know how many plans administer as well as 
sponsor health plans and invited comments on the number of self-
administered plans. As we did not receive comments on this issue, we 
assume that there are not enough self-administered plans to have an 
effect on these estimates.
    Each of the approximately 1,500 health insurance issuers and health 
plan administrators will experience the same kinds of costs as we 
estimated for providers for drafting ($28 per entity) and printing 
($0.10 per notice) the NPPs. However, health insurers and plan 
administrators will have to mail the NPPs to policy holders. We 
recognize that, under the existing requirement to send new NPPs in a 
separate mailing to all policy holders, the costs of distributing new 
NPPs, including clerical time and in some cases, postage, constituted 
the majority of the overall costs of the rule to covered entities. 
However, in the proposed rule, we requested comments on alternative 
ways to inform individuals of material changes to their rights and 
protections that would be less burdensome and costly. Based on the 
comments and consistent with E.O. 13563, in this final rule, we have 
adopted an alternative to the requirement to send the new NPP to all 
policy holders within 60 days. After consideration, we decided to 
permit health plans and third party administrators working for health 
plans to include the revised NPP in their next annual mailing, rather 
than within 60 days of the material change, if they have a Web site 
with an NPP. See Sec.  164.520(c)(1)(v)(A). We anticipate that most, if 
not all, affected entities will take advantage of this option and will 
not send the NPP in a separate mailing. As such, we expect that the 
vast majority of health insurers will not incur any out-of-cycle NPP 
dissemination costs.
    Nonetheless, to account for any costs that might be incurred by a 
small

[[Page 5676]]

minority of health insurers to distribute the revised NPPs in a 
separate mailing, we have calculated the costs to these entities of 
doing so. We describe our methodology in the following paragraphs, 
beginning with an estimated total number of NPP recipients. We then 
calculate the costs of printing and sending the revised NPP by separate 
mailings to all recipients and estimate that no more than 10 percent of 
these costs will actually be incurred.
    Because the Privacy Rule requires that only the named insured or 
policy holder is notified of changes to the health plans' privacy 
practices even if that policy also covers dependents, we expect that 
only policy holders will receive the revised NPPs mandated by this 
rule. This assumption is consistent with the practices of public 
programs, such as Medicare, which has a policy of mailing one notice or 
a set of program materials to a household of four or fewer 
beneficiaries at the same address. As a result, although there are 50.7 
million individual Medicare beneficiaries, the program only sends out 
approximately 36 million pieces of mail per mailing.
    Actuarial Research Corporation (ARC), our consultant, estimated the 
number of policy holders for all classes of insurance products to be 
approximately 183.6 million, including all public programs. The data 
comes from the Medical Expenditure Panel Survey from 2004-2006 
projected to 2010. ARC estimated 112.6 million private sector policy 
holders and 71.0 million public ``policy holders.'' The total, 
including more recent Medicare data, is 188.3 million persons (which 
results in roughly a split of 60 percent private policy holders and 40 
percent public ``policy holders''), whom we expect to receive NPPs from 
their plans. The estimates do not capture policy holders who are in 
hospitals or nursing homes at the time of the survey, or individuals 
who may have been insured under more than one plan in a year, for 
example, because their job status changed, they have supplemental 
policies, or they have more than one employer, creating duplicate 
coverage. Therefore, ARC recommended we use 200 million for the number 
of NPPs that will actually be sent.
    We estimate the costs of drafting, printing, and distributing the 
NPP to all potential recipients to be the following. First, drafting 
the NPP is estimated to require one-third hour of legal services at a 
cost of $28 x 1,500 insurance plans and insurance administrative 
entities, which equals $42,000. Second, we need to calculate printing 
and distribution costs for all potential recipients assuming the 
revised notice would be sent in a separate mailing. As with providers, 
we estimate the cost of printing the NPP, which includes the cost of 
paper and actual printing, to be $0.10 per notice. Therefore, we 
estimate the cost of printing 200 million notices for mail distribution 
at $20 million. Further, we estimate the cost of distributing the NPPs, 
including clerical time and postage in the same manner as these costs 
were estimated for the Breach Notification for Unsecured Protected 
Health Information Regulations. Thus, we assume that an office worker 
could process and send 100 mailings per hour at a cost of $22.53 per 
hour, plus a postage cost of $0.45 per mailing. If notices were 
required to be mailed to the 200 million beneficiaries in the sixty-day 
timeframe, the distribution costs would be $135 million (200 million/
100 per hour x $22.53 = $45 million + $90 million (200 million x 
$0.45)). Total printing and distribution cost would have been $155 
million, if all policy holders received separate NPP mailings. Third, 
as discussed above, we expect that nearly all plans and third party 
administrators will be able to avoid having to do a separate mailing of 
the revised notice under the new distribution provisions in this final 
rule, and that only 10 percent of these plans will incur the printing 
and distribution costs. Using the above estimates, we assume for this 
purpose that 20 million notices (200 million total notices x 10%) will 
be need to be printed and sent through a separate mailing, at a total 
cost of $15.5 million ($2 million printing + $13.5 million mailing). 
Therefore, the total cost to all plans for drafting, printing, and 
distributing the NPP is approximately $15.5 million. We note that even 
this total may be an overestimation of the costs because many insurers 
may use bulk mailing rates to distribute their NPPs which would reduce 
their mailing costs.
    The total estimated cost for both providers and health plans to 
notify individuals and policy holders of changes in their privacy 
rights is approximately $55.9 million in the first year following 
implementation of the rule.
    A number of commenters expressed general concern regarding the 
costs of printing and distributing new NPPs but did not provide 
estimates of the costs they anticipated or question our calculations. 
Two health plan commenters estimated that the costs of printing and 
mailing NPPs to their members could reach up to $100,000. However, they 
did not provide information about the facts and assumptions underlying 
their analyses, including the number of beneficiaries or mailings they 
anticipated, so we were unable to evaluate their estimates. We have 
addressed some of this concern by permitting health plans that maintain 
a notice on their web sites to include their NPPs in their annual 
mailings, rather than separately mailing the NPPs within 60 days of the 
material changes.
    Table 5 below presents our analysis of costs to the providers, 
insurers, and third party administrators that are required to issue 
NPPs under the rule.\38\
---------------------------------------------------------------------------

    \38\ Health care clearinghouses function almost exclusively as 
business associates with respect to the protected health information 
they maintain and process, and therefore have no NPP requirements.

                      TABLE 5--Summary of Compliance Cost for Notices of Privacy Practices
----------------------------------------------------------------------------------------------------------------
                                                             Health insurers & third
         Cost elements                   Providers             party administrators         Total (approx.)
----------------------------------------------------------------------------------------------------------------
Drafting NPPs.................  $20 million...............  $42,000..................  $20 million.
Printing NPPs.................  $20.4 million.............  $2 million...............  $22.4 million.
Mailing NPPs..................  N/A.......................  $13.5 million............  $13.5 million.
                               ---------------------------------------------------------------------------------
    Total (approx.)...........  $40.4 million.............  $15.5 million............  $55.9 million.
----------------------------------------------------------------------------------------------------------------


[[Page 5677]]

3. Business Associates and Covered Entities and Their Contractual 
Relationships
    The rule extends liability for failure to comply with certain 
provisions of the Privacy and Security Rules directly to business 
associates and business associate subcontractors. Prior to this rule 
and HITECH, these obligations applied to business associates and their 
subcontractors indirectly through Sec. Sec.  164.504(e) and 164.314(a), 
which require that covered entities by contract require business 
associates to limit uses and disclosures and implement Security Rule-
like safeguards.
    This final rule implements Section 13401 of HITECH Act, which makes 
business associates directly liable for compliance with many of the 
same standards and implementation specifications, and applies the same 
penalties to business associates that apply to covered entities, under 
the Security Rule. Additionally, in accord with Section 13404 of the 
HITECH Act, the rule requires business associates to comply with many 
of the same requirements, and applies the same penalties to business 
associates that apply to covered entities, under the Privacy Rule. 
Business associates must also obtain satisfactory assurances in the 
form of a business associate agreement from subcontractors that the 
subcontractors will safeguard any protected health information in their 
possession. Finally, business associates must furnish any information 
the Secretary requires to investigate whether the business associate is 
in compliance with the regulations.
    In the proposed rule, we assumed that business associates' 
compliance with their contracts range from the minimal compliance to 
avoid contract termination to being fully compliant. Further, we 
assumed that business associates in compliance with their contracts 
would have already designated personnel to be responsible for 
formulating the organization's privacy and security policies, performed 
a risk analysis, and invested in hardware and software to prevent and 
monitor for internal and external breaches of protected health 
information.
    We also stated in the proposed rule that while business associates 
were previously required to comply with the HIPAA Rules according to 
the terms of their contracts with covered entities, and we expected 
that most business associates did so already, the risk of criminal and/
or civil monetary penalties may spur some business associates to 
increase their efforts to comply with the Rules. We explained that we 
have no information on the degree of contract enforcement and 
compliance among business associates, and lack information regarding 
the size or type of business associates that contract with covered 
entities. We have only rough estimates as to the overall number of 
business associates, which range from approximately one million to two 
million depending on the number of business associates that serve 
multiple covered entities.
    While we did not have specific information in this regard, we 
assumed that some business associates and subcontractors already comply 
with existing privacy and security standards in accordance with their 
indirect and contractual obligations. For them, the proposed rule would 
impose only a limited burden. For other business associates, depending 
on the current level of compliance, the proposed rule could impose 
significant burdens. We requested comments regarding the amount of 
burden and the number of affected business associates.
    Several commenters stated that requiring business associates to 
undertake compliance with the rule in the same way as covered entities 
is excessive and burdensome, especially because in some cases business 
associates do not have the same type of relationship with individuals. 
Several commenters pointed to the burden on covered entities and 
business associates to renegotiate business associate agreements and 
train staff, and many specifically mentioned that compliance with the 
Security Rule is particularly costly. One commenter stated that it was 
a business associate party to ``tens of thousands'' of business 
associate contracts, with a significant cost to bring all into 
compliance.
    We continue to expect that most business associates and 
subcontractors have made and continue to make a good-faith effort to 
follow the terms of their contracts. The burden of the rule on business 
associates and subcontractors depends on the terms of the contracts 
between covered entities and business associates and between the 
business associates and subcontractors, and the degree to which 
business associates and subcontractors established privacy policies and 
adopted security measures that comport with the HIPAA Rules. For 
business associates and subcontractors that have already taken HIPAA-
compliant measures to protect the privacy and security of the protected 
health information in their possession, as required by their existing 
contracts, the rule imposes limited burden. We estimate the costs to 
other business associates later in this section.
    A few commenters cited concerns about unfair competition for 
smaller business associate entities that they believe will not be able 
to compete with larger business associate entities, especially with 
regard to contract negotiations including indemnification and other 
risk allocation issues.
    We understand that many small business associates are concerned 
about the allocation of risk and indemnification in conjunction with 
their business associate contracts. However, as we discuss in section 
IV D above, as with any contracting relationship, business associates 
and covered entities may include other provisions that dictate and 
describe their business relationship. While these may or may not 
include indemnification clauses or other risk-shifting provisions, 
these contractual provisions and relationships are outside the 
governance of the HIPAA Rules.
    Because we understand that covered entities and business associates 
remain concerned with the cost to bring their business associate 
agreements into compliance with the final rule, we allow contracts to 
be phased in over one year from the compliance date or 20 months from 
the publication date of the final rule, and we expect and encourage 
covered entities and business associates to incorporate the costs of 
modifying contracts into the normal renegotiation of contracts as the 
contracts expire. As we did not receive comments to the contrary, we 
believe that most contracts will be renegotiated over the phase-in 
period. In addition, the Department has issued on its web site revised 
sample business associate provisions, which should lessen the costs 
associated with contract modifications.
    As we believe covered entities generally are operating under HIPAA 
compliant contracts with their business associates, the transition 
period and availability of sample contract provisions should make it 
possible for these entities to incorporate any minor contract 
modifications into normal contract renegotiations without any 
appreciable added costs. We continue to believe that all covered 
entities have established business associate agreements with their 
business associates that are consistent with the requirements of the 
HIPAA Rules, as covered entities have been subject to direct liability 
under the Rules since their inception and have had more than half a 
dozen years to make their contracts compliant. However, to the extent 
that some contracts between covered entities and business associates

[[Page 5678]]

are not currently in full compliance with the business associate 
agreement provisions, these entities may experience limited costs to 
revise their contracts.
    Although we are less certain about the current state of business 
associate-subcontractor relationships, we believe that most business 
associates have made a good faith attempt to include the appropriate 
contractual requirements. Still, we anticipate that some small business 
associates, now that they are subject to direct liability under the 
rules, might establish or significantly modify their subcontracts to 
come into compliance for the first time. Such business associates would 
not be eligible for the extended transition period and, as a result, 
would incur the costs of creating new contracts or renegotiating 
contracts out of cycle. In the Final Privacy Rule published in 2002, we 
estimated that entities would need between one and two hours to develop 
and tailor a business associate agreement to their particular needs. 
See 67 FR 53182, 53257. Taking the average of the lower and upper 
estimates provided in the earlier rulemaking, we estimate that 
developing and tailoring contract language normally would take 
approximately 90 minutes of professional legal services at $84.32 per 
hour.\39\ However, as in the 2002 Final Privacy Rule (67 FR 53257), we 
estimate that providing model language will reduce the time required to 
develop contract language by at least one third. Thus, we estimate that 
each new or significantly modified contract between a business 
associate and its subcontractors will require, at most, one hour of a 
lawyer's time at a cost of $84.32.
---------------------------------------------------------------------------

    \39\ See https://www.bls.gov/oes/current/naics3_541000.htm#23-0000 for lawyers. Note that we generally calculate labor costs based 
on the median hourly rate, which for lawyers is $56.21 per hour. We 
add 50 percent to account for fringe benefits, resulting in an 
estimated hourly cost of $84.32.
---------------------------------------------------------------------------

    We believe that no more than 25 percent of 1-2 million business 
associates, or 250,000-500,000 entities, would not have already made 
good faith efforts to achieve compliance and will need to create or 
significantly modify subcontracts, resulting in total costs of between 
$21 million and $42 million.
    We expect that each business associate's lawyer will draw up one 
standard contract to use for all of its subcontracts. We do not 
attribute contract revision costs to subcontractors because the 
required contract provisions are not negotiable and subcontractors will 
need to only sign the agreement. We note that our estimated cost likely 
is an overestimate because the group of small business associates that 
may be less likely than others to have compliant contracts in place 
with subcontractors are, because of their size, also less likely to 
have any subcontractors at all.
    Finally, in response to the commenters concerned with the cost and 
burden on business associates to come into full compliance with the 
Security Rule, we have taken another look at the underlying assumptions 
in the proposal. We continue to believe that business associates have 
engaged in privacy practices in compliance with their contractual 
obligations to use and disclose protected health information as limited 
by the Privacy Rule and their particular contracts with covered 
entities. Therefore, as we have stated above, we do not believe that 
the extension of liability for compliance with Privacy Rule 
requirements as identified in this rulemaking will impose any new costs 
or burdens.
    With regard to the Security Rule, which was of particular concern 
to commenters as to the compliance costs on business associates, we 
also continue to believe that business associates, in providing their 
adequate assurances to safeguard electronic protected health 
information through their business associate contracts, have 
implemented security protections that meet the standards and required 
implementation specifications in the Security Rule. Further, we 
continue to believe that business associates have made the necessary 
investment in hardware and software to secure the electronic protected 
health information as part of the investment in the hardware and 
software needed for their management and processing of this information 
to perform their business associate functions and comply with the 
contract requirements at Sec.  164.314(a). However, based on the 
comments, we now believe that some business associates, particularly 
smaller business associates that may have access to electronic 
protected health information for limited purposes, may not have engaged 
in certain of the formal administrative safeguards. For example, these 
entities may not have performed a risk analysis, established a risk 
management program, or designated a security official, and may not have 
written policies and procedures, conducted employee training, or 
documented compliance as required under Sec. Sec.  164.308 and 164.316 
of the Security Rule.
    We do not have information on what percentage of business 
associates may have to engage in efforts to comply with some of the 
administrative safeguard standards, including documenting their 
policies and procedures and training their employees on the policies 
and procedures, nor did the comments on the impact statement offer any 
specific information to provide an estimate. We assume that up to 80 
percent of the 1-2 million business associates, or between 800,000 and 
1.6 million business associates, may handle electronic protected health 
information and thus may have to document their existing security 
protocols. Further, of these business associates, we assume that no 
more than 25 percent are likely to incur some cost to document their 
administrative safeguards and their policies and procedures as now 
required by statute and these regulations. We believe that our original 
assumption of compliance with all Security Rule requirements remains 
sound for the rest of the business associates, and we received no 
substantive comments to the contrary.
    The costs of coming into full compliance with the administrative 
safeguard procedures, such as performance of a risk analysis and 
development of a risk management plan, will vary depending on the size 
and complexity of the business associate, the scope of their duties for 
the covered entity and the protected health information they must 
secure, and the degree to which their prior documentation of their 
security protocols falls short of compliance with the standards in the 
Security Rule. In the original Security Rule, we estimated that covered 
entities would need approximately 16 hours to document their policies 
and procedures. See 68 FR 8334, 8368. As these policies and procedures 
are the reflection of the risk management plan, which in turn is based 
on the risk analysis, we believe that this estimate would be inclusive 
of that time. We believe it will take business associates on average 
much less time to document their security related policies and 
procedures, because they have likely already engaged in most of the 
analysis associated with the adoption of security protocols, even if 
they may not have formally reduced all such protocols to writing, and 
because the scope of their responsibilities will generally be much more 
constrained than that of the covered entity with whom they have 
contracted. In addition, while covered entities must perform these 
tasks with respect to their entire business, generally only a small 
part of any business associate is involved with electronic protected 
health information.
    Extrapolating from our estimate in the original Security Rule that 
entities would require approximately 16 hours to implement and document 
Security

[[Page 5679]]

Rule compliance measures for the first time, and applying the 
assumption that most of these measures already are in place, we 
estimate that these business associates will need only between 2 and 5 
hours to formalize or update their applicable administrative 
safeguards. We would cost the time needed to come into compliance at 
$56.61/hour.\40\ According to these assumptions, the range of costs 
that any one business associate would incur to comply with the new 
statutory and regulatory requirements would be between $113 and $283, 
as first year, one-time costs. Assuming that businesses associates with 
access to electronic protected health information represent 80 percent 
of 1 to 2 million total business associates (or 800,000 to 1.6 million 
total), the aggregated costs for all business associates are estimated 
to be between approximately $22.6 million and $113 million. (25 percent 
of 800,000 business associates = 200,000; 200,000 x $113 (2 hr @ 
$56.61/hr) = $22.6 million. 25 percent of 1.6 million business 
associates = 400,000; 400,000 x $283 (5 hr @ $56.61/hr) = $113 
million.) These costs represent one time first year costs for full 
compliance by business associates with the Security Rule requirements.
---------------------------------------------------------------------------

    \40\ We have used the median wage rate described by the U.S. 
Bureau of Labor Statistics in its 2011 National Compensation Survey 
for the category of Management Analysts (including responsibilities 
for designing systems and procedures), which is approximately 
$37.74/hr. See https://www.bls.gov/oes/current/oes_nat.htm . To this 
wage rate we have added 50 percent for benefits, which results in a 
total cost of $56.61/hr.
---------------------------------------------------------------------------

    Table 6 below presents the range of our estimates of the costs to 
business associates of achieving compliance with the rules.

                           TABLE 6--Business Associate Cost Estimates in 2011 Dollars
----------------------------------------------------------------------------------------------------------------
                                                                            BAA between business associates and
           Data element            Security rule compliance documentation              subcontractors
----------------------------------------------------------------------------------------------------------------
Estimated number of affected       200,000-400,000 BAs...................  250,000-500,000 BAs.
 entities.
Hours needed to complete           2-5 hours per BA......................  1 hour per BA.
 compliance activities.
Cost per hour....................  $56.61................................  $84.32.
Total cost.......................  $22.6 million-$113 million............  $21 million-$42 million.
----------------------------------------------------------------------------------------------------------------

Response to Other Public Comments
    Comment: One commenter suggested that business associates will be 
reluctant to contract with covered entities due to perceived increased 
risks associated with such contracts, and covered entities will be 
forced to hire more staff at additional costs.
    Response: While the HIPAA Rules now impose direct liability with 
regard to compliance, business associates were previously contractually 
liable for compliance with these provisions. Further, whether a covered 
entity uses workforce members or business associates to perform its 
operations remains a decision for the covered entity. As this commenter 
did not provide specific information about his concerns, we cannot 
quantify the costs associated with this comment, nor do we have a basis 
for concluding that business associates will refuse to contract with 
covered entities as a result of this rule.
    Comment: One commenter suggested that requiring business associate 
agreements will increase the costs of litigation.
    Response: As business associate agreements were required under the 
HIPAA Rules previously, and as the commenter did not include specific 
information about what costs he believes will increase, we do not 
believe such a requirement will increase litigation generally.
4. Qualitative Analysis of Unquantified Costs
a. Authorization for Uses and Disclosures of Protected Health 
Information for Marketing and Sale of Protected Health Information
    The final rule modifies the definition of ``marketing'' to 
encompass treatment and health care operations communications to 
individuals about health-related products or services if the covered 
entity receives financial remuneration in exchange for making the 
communication from or on behalf of the third party whose product or 
service is being described. A covered entity must obtain an 
individual's written authorization prior to sending marketing 
communications to the individual.
    In the proposed rule, we requested comment on the extent to which 
covered entities currently receive financial remuneration from third 
parties in exchange for sending information to individuals about the 
third parties' health-related products or services. In general, 
commenters did not indicate that complying with the final rule would be 
administratively burdensome, but some commenters expressed a general 
concern over the potential loss of revenue given the new restrictions 
on receiving financial remuneration from a third party to send health-
related communications to an individual. These comments appear to 
indicate that most covered entities would not attempt to obtain 
authorizations for the now prohibited communications but rather would 
forgo making them altogether. We acknowledge the potential for some 
lost revenue due to these modifications in cases where covered entities 
are currently receiving financial remuneration from third parties to 
send health-related communications to individuals. However, as we do 
not know to what extent covered entities today currently operate in 
this manner, and commenters did not include specific information in 
this regard, we do not have data that could inform quantifying such 
loss.
    The final rule also requires an individual's authorization before a 
covered entity may disclose protected health information in exchange 
for remuneration (i.e., ``sell'' protected health information), even if 
the disclosure is for an otherwise permitted disclosure under the 
Privacy Rule. The final rule includes several exceptions to this 
authorization requirement. In the proposed rule, we stated that on its 
face, this new prohibition would appear to increase the burden to 
covered entities by requiring them to obtain authorizations in 
situations in which no authorization is currently required. However, we 
believed such a scenario to be unlikely. We believed most individuals 
would not authorize disclosures of their protected health information 
when they were informed the covered entity would be remunerated for the 
disclosure. Thus, we believed covered entities would simply discontinue 
making such disclosures as it would not be

[[Page 5680]]

worthwhile for covered entities to continue to attempt to obtain such 
authorizations. We requested comment on these assumptions.
    As noted above, the requirement to obtain authorization to receive 
remuneration to make a disclosure of protected health information 
contains several exceptions. In the proposed rule, we expressed our 
belief that covered entities would not incur additional costs to 
continue making most of the excepted disclosures as such exceptions 
were not constrained or limited in any way and thus, would not change 
the status quo. However, we recognized that the exception for research 
disclosures may impose additional burden on researchers as it was, 
consistent with the statute, a conditional exception. Covered entities 
would be able to disclose protected health information under the 
research exception only to the extent any remuneration received in 
exchange for the information did not exceed the cost to produce and 
transmit the information. Thus, we recognized that researchers who 
purchase data from covered entities may now incur additional costs as a 
result of the final rule, in order to obtain newly required 
authorizations, if they are currently paying a covered entity more than 
the cost to produce and transmit the protected health information 
(e.g., an incentive payment to produce the data) and the covered entity 
is not willing to accept only the costs to prepare and transmit the 
data. It was also recognized that some research may be jeopardized to 
the extent that authorizations for the entity to receive these 
incentive payments could not be obtained from subjects. On the other 
hand, to the extent covered entities agreed to receive only the costs 
to prepare and transmit the data, these entities would experience a 
loss of revenue while researchers would experience a corresponding 
decrease in costs, and current disclosures for research purposes could 
continue without authorization. While we acknowledged the potential 
costs under this provision, we stated that we have no information on 
the amounts currently paid to covered entities by researchers for 
protected health information, and thus, had no way to estimate the 
impact of the provision. We solicited comment in this area.
    Overall, commenters did not indicate that obtaining authorization 
prior to disclosing protected health information in exchange for 
remuneration would result in an increased burden or cost for the 
covered entity. However, one commenter did estimate that obtaining 
additional authorizations may cost approximately $22 to $28, per 
patient. Some commenters indicated it may be burdensome to determine if 
remuneration was in fact received by the entity.
    The comments on this provision did not alter our belief that, in 
general, covered entities would discontinue making disclosures in 
exchange for remuneration that require the individual's authorization, 
given the unlikelihood most individuals would agree to authorize such 
disclosures. Further, there are a number of exceptions to the general 
prohibition that allow a covered entity to continue to operate ``status 
quo'' with respect to a number of types of disclosures, even if the 
covered entity receives remuneration. In response to the comments, we 
acknowledge that it may be difficult to determine whether remuneration 
has been received by a covered entity, particularly since the 
prohibition encompasses both direct and indirect (i.e., non-financial) 
remuneration. We expect to issue future guidance on this topic to 
assist entities in complying.
    With respect to the amounts currently paid to covered entities by 
researchers, some commenters indicated as a general concern that 
limiting remuneration received by covered entities from researchers may 
provide a disincentive for covered entities to continue assisting 
researchers in their efforts. However, commenters did not quantify what 
they are paying covered entities above the costs to prepare and 
transmit the data, nor did they provide information that would give the 
Department an idea of the extent to which covered entities receive such 
payments. Therefore, while we acknowledge the potential for some lost 
revenue to covered entities due to these modifications or some 
additional costs to researchers to obtain authorizations, we do not 
have data that could inform quantifying such costs. At the same time, 
we note that we have made some clarifications in the above preamble 
discussion regarding these provisions that we believe would lessen any 
such impact. Specifically, the preamble explains that we do not 
consider a sale of protected health information to encompass payments a 
covered entity may receive in the form of grants, or contracts or other 
arrangements to perform programs or activities, such as a research 
study, where any provision of protected health information to the payer 
is a byproduct of the service being provided. Thus, the payment by a 
research sponsor to a covered entity to conduct a research study is not 
considered a sale of protected health information even if the study 
involves disclosing research results that include protected health 
information to the sponsor. In contrast, a sale of protected health 
information includes disclosures of protected health information where 
a covered entity is receiving remuneration from or on behalf of the 
recipient of the data for the information itself. Thus, a disclosure of 
protected health information by a covered entity to a third party 
researcher that is conducting the research in exchange for remuneration 
would fall within these provisions, unless the only remuneration 
received is a reasonable, cost-based fee to cover the cost to prepare 
and transmit the data for such purposes.
b. Individual Right To Opt Out of Fundraising Communications
    The current Privacy Rule requires covered entities give individuals 
the opportunity to opt out of receiving future fundraising 
communications from the entity. The HITECH Act and final rule 
strengthens the opt out by requiring that it be clear and conspicuous 
and that an individual's choice to opt out should be treated as a 
revocation of authorization. While the rule specified that a clear and 
conspicuous opt out method must not cause an individual to incur an 
undue burden or more than a nominal cost, proposed rule did not specify 
the method to be employed but rather left it up to the discretion of 
the covered entity. We requested comment on the extent to which the 
requirement that the opportunity to elect not to receive further 
fundraising communications be clear and conspicuous would have an 
impact on covered entities and their current fundraising materials.
    Overall, commenters did not indicate that requiring the opt out for 
further fundraising to be clear and conspicuous would greatly impact 
covered entities and their current fundraising efforts or provide 
specific anticipated costs in this regard. Rather, some commenters 
indicated that they already provide pre-paid, pre-printed postcards for 
this purpose with fundraising mailings and doing so is neither costly 
nor imposes a significant burden on the individual who wishes to opt 
out of further communications. Based on this feedback and the continued 
flexibility in the final rule to choose the opt out method (e.g., toll-
free number, post-card), we do not believe that the requirement that 
fundraising opt-outs be clear and conspicuous will result in 
significant new costs to covered entities.
    Further, while some commenters did indicate that a pre-solicitation 
opt out would be costly for covered entities in

[[Page 5681]]

response to our request for comment on this issue, as a result of this 
general opposition, the final rule does not change the current 
requirement that covered entities only need to include an opt-out with 
any solicitation sent to an individual rather than to the first 
fundraising communication.
c. Individuals' Access to Protected Health Information
    In this final rule, we strengthen an individual's right to receive 
an electronic copy of his or her protected health information. 
Specifically, as was proposed, the final rule requires that if an 
individual requests an electronic copy of protected health information 
that is maintained electronically in one or more designated record 
sets, the covered entity must provide the individual with access to the 
electronic information in the electronic form and format requested by 
the individual, if it is readily producible, or, if not, in a readable 
electronic form and format as agreed to by the covered entity and the 
individual. Also, as in the proposed rule, the final rule provides that 
a covered entity may charge a fee for costs associated with labor and 
supplies for creating an electronic copy, including electronic portable 
media if agreed to by the individual, and clarifies that a covered 
entity may charge for postage if an individual requests that the 
covered entity transmit portable media containing an electronic copy 
through mail or courier. However, covered entities may not include fees 
associated with maintaining systems, retrieval costs, or infrastructure 
costs in the fee they charge to provide an electronic copy.
    We continue to believe that this requirement will not result in 
significant new burdens on covered entities. Individuals already had a 
right to access protected health information maintained in electronic 
designated record sets under the prior Rule, and already had a right to 
receive an electronic copy of such information to the extent the 
electronic copy was readily producible by the covered entity. The Rule 
provides significant flexibility to covered entities in honoring 
individuals' request for electronic access. While a covered entity must 
provide some type of electronic copy to an individual who requests one, 
a covered entity is not required to provide the exact form of the copy 
or access requested by the individual if it is not readily producible 
in such form. Thus, covered entities may provide readily producible 
electronic copies of protected health information that are currently 
available on their various systems. A covered entity is not required to 
purchase new software or systems in order to accommodate an electronic 
copy request for a specific form that is not readily producible by the 
covered entity at the time of the request, provided that the covered 
entity is able to provide some form of electronic copy. Further, in 
cases where an individual chooses not to accept the electronic copy 
that is readily producible by the covered entity, a hard copy may be 
offered.
    We did hear from several commenters that some legacy or other 
systems, while capable of producing a hard copy as previously required 
under the existing access requirement, may not be capable of producing 
any electronic copy at present. In these cases, covered entities may 
incur some cost burden in order to purchase software or hardware to 
produce some kind of electronic copy for electronic information held in 
designated record sets on such legacy systems. However, covered 
entities are not required to purchase additional software or hardware 
to meet individuals' specific requests, as long as at least one type of 
electronic copy is available. We anticipate some cost will be incurred 
by covered entities with such systems; however we did not receive 
comments on the extent of these costs, or the number of covered 
entities with legacy systems that will need to incur such costs.
d. Right To Restrict Certain Disclosures to a Health Plan
    The final rule requires that a covered health care provider agree 
in most cases to an individual's request to restrict disclosure to a 
health plan of the individual's protected health information that 
pertains to a health care service for which the individual has paid the 
health care provider in full out of pocket. This is a change from the 
prior rule, which provided individuals with the right to request a 
restriction on certain disclosures; however, a covered entity was not 
required to agree to the restriction, whatever the circumstances. We do 
not believe that covered health care providers will incur substantial 
costs to implement this expanded right for a number of reasons. First, 
in order to comply with the rule prior to this change, a covered entity 
is already required to have processes and procedures in place for 
accepting and considering individuals' requests for restrictions, even 
if, as a general matter, the covered entity declines to agree to such 
requests. This final rule does not require new or different processes 
for receiving and reviewing requests for restrictions, just that the 
covered entity honor, in most cases, a self-pay patient's request for a 
restriction to a health plan. Second, for those covered health care 
providers that do not currently, but will now be required to, 
accommodate requests by self-pay patients to restrict disclosures to a 
health plan, the final rule provides significant flexibility in how 
providers are to honor an individual's request and the preamble makes 
various clarifications in response to comments as to how to 
operationalize this new requirement. For example, the final rule makes 
clear that a health care provider is not required to separate or 
segregate records in order to ensure an individual's restriction 
request is honored. Rather, the final rule leaves it to the discretion 
of the provider as to how to flag information that is the subject of a 
restriction. Further, the final rule provides flexibility as to how 
restriction requests for certain services, such as bundled services, 
are to be handled, as well as what reasonable efforts should be made to 
obtain payment from an individual whose original form of payment has 
been dishonored, prior to resorting to billing the health plan for the 
service. Finally, in response to comments regarding the potential 
burden and cost of doing so, the final rule does not require health 
care providers to inform downstream providers who may receive the 
individual's protected health information, such as a pharmacy or 
specialist, of a restriction, given the lack of automated technologies 
to support such a requirement.
    Notwithstanding the above, we acknowledge that there will be some 
additional burden on certain health care providers to ensure an 
individual's request to restrict a disclosure to a health plan is 
honored where such a request would not have been honored in the past. 
However, we do not have data to inform quantifying an estimated cost in 
this area. For example, we do not have data on the number of providers 
that currently accommodate requests from self-pay patients to restrict 
disclosures versus those that do not, the number of requests that 
covered health care providers receive today that would now require a 
restriction, nor even the number of requests for restrictions generally 
that covered health care providers currently receive.
e. Impact of the Genetic Information Underwriting Prohibition on Health 
Plans
    The final rule prohibits health plans that are HIPAA covered 
entities, except issuers of long term care policies, from using or 
disclosing an individual's protected health information that is

[[Page 5682]]

genetic information for underwriting purposes. As we explained in the 
proposed rule, the rule does not affect health plans that do not 
currently use or disclose protected health information for underwriting 
purposes. Further, even with respect to health plans that perform 
underwriting, plans and issuers in the group market previously 
commented to the Department that they do not, even prior to the passage 
of GINA, use genetic information for underwriting purposes because pre-
GINA laws and regulations prohibit them from discriminating against 
individuals based on any health status related factors, including 
genetic information. With respect to issuers in the individual health 
insurance market, the Department acknowledged in the proposed rule that 
there may be more significant policy changes associated with the 
prohibition on using or disclosing protected health information that is 
genetic information for underwriting purposes. However, the Department 
explained in the proposed rule that it did not have sufficient 
information to determine the extent of such changes, that is, to what 
extent issuers in the individual health insurance market use genetic 
information for underwriting purposes. Regardless, as we explained in 
the proposed rule, in the case of either the individual or group 
market, the Department assumed, because a prohibited use or disclosure 
of genetic information for underwriting purposes would also be a 
discriminatory use of such information under the nondiscrimination 
provisions of GINA Title I and its implementing regulations, that there 
would be no costs associated with conforming a plan's practices to 
comply with the underwriting prohibition that are above and beyond the 
costs associated with complying with the regulations implementing 
sections 101-103 of GINA. With respect to the health plans not covered 
by GINA but subject to the proposed prohibition in the Privacy Rule, 
the Department also assumed that the costs to comply would be minimal 
because such plans either: (1) do not perform underwriting, as is the 
case generally with public benefit plans; or (2) perform underwriting 
but do not in most cases use genetic information (including family 
medical history) for such purposes.
    In general, most comments in response to the proposed rule did not 
provide information that contradicted the above assumptions. However, 
concern was expressed regarding the adverse impact of such an 
underwriting prohibition on the long-term care market. Given the 
concern regarding the impact of the underwriting prohibition on the 
long-term care market, the final rule exempts such plans from the 
prohibition. Thus, there are no costs to be attributed to long term 
care plans with this rule. Further, given we did not receive other 
comments that would lead us to question the underlying assumptions in 
the proposed rule, we do not expect this provision of the final rule to 
result in substantial new costs on health plans, particularly those 
that have been required to comply with the regulations implementing 
GINA's nondiscrimination provisions for several years now.
f. Enforcement Provisions
    The amendments contained within this final rule to the HIPAA 
Enforcement Rule conform the regulatory language of the Rule to the 
enhanced enforcement provisions of the HITECH Act. Consistent with its 
reasoning in prior HIPAA Enforcement rulemakings,\41\ the Department 
expects the costs covered entities, and now business associates, may 
incur with respect to their compliance with the Enforcement Rule, 
itself, should be low in most cases. That is, covered entities and 
business associates that comply with the HIPAA rules voluntarily, as is 
expected, should not incur any additional, significant costs as a 
result of the Enforcement Rule. Further, we believe the increased 
penalties and other enhancements provided by the HITECH Act and which 
are reflected in this final rule provide even more incentive to covered 
entities and business associates to take steps necessary to comply and 
thus not be liable for violations.
---------------------------------------------------------------------------

    \41\ See the preambles to the proposed and final Enforcement 
Rules at 70 FR 20224, 20248-49 (April 18, 2005) and 71 FR 8390, 8424 
(February 16, 2006).
---------------------------------------------------------------------------

D. Qualitative Analysis of Unquantified Benefits

    While we are certain that the regulatory changes in this final rule 
represent significant benefits, we cannot monetize their value. Many 
commenters agreed with our assumptions regarding the benefits to 
individuals, but we did not receive any comments that included specific 
information about quantifying those benefits. The following sections 
describe in greater detail the qualitative benefits of the final rule. 
In addition to greater privacy protections for individuals, these 
benefits include the results of our efforts to reduce burdens. 
Consistent with E.O. 13563, we conducted a retrospective review of our 
regulations and identified areas, such as certain research 
authorization requirements and disclosures to schools regarding 
childhood immunizations, in which we could decrease costs and increase 
flexibilities under the HIPAA Rules. The resulting changes are 
discussed below.
1. Greater Privacy Protections for Individuals
    The benefits for individuals include added information on their 
rights through an expanded NPP, and greater rights with regard to the 
uses and disclosures of their personal health information through 
expanded requirements to: (1) Obtain authorization before a covered 
entity or business associate may disclose their protected health 
information in exchange for remuneration, (2) restrict certain 
disclosures to a health plan at the request of the individual, (3) 
strengthen the ability of individuals to opt out of further fundraising 
communications, and (4) limit uses and disclosures of protected health 
information for marketing. Individuals also will benefit from increased 
protection against discrimination based on their genetic information, 
achieved through the prohibition against health plans using or 
disclosing protected health information that is genetic information for 
underwriting purposes. Individuals also will have increased access to 
their protected health information in an electronic format.
    Finally, under the rule, individuals' health information will be 
afforded greater protection by business associates of covered entities 
who share liability and responsibility with the covered entity for 
safeguarding against impermissible uses and disclosures of protected 
health information.
2. Breach Notification
    The analysis of benefits of the breach notification regulation is 
as stated in the interim final rule. In summary, we stated that 
notifying individuals affected by a breach would alert them to and 
enable them to mitigate potential harms, such as identity theft 
resulting from the exposure of certain identifiers, and reputational 
harm that may result from the exposure of sensitive medical 
information. Further, the breach notification requirements provide 
incentive to covered entities and business associates to better 
safeguard protected health information, such as by encrypting the 
information, where possible.
    We also believe that the modifications to the definition of breach 
to remove the harm standard and revise the risk assessment will ensure 
that covered

[[Page 5683]]

entities and business associates apply the rule in a more objective and 
uniform manner. We believe that these modifications will make the rule 
easier for covered entities and business associates to implement and 
will result in consistency of notification across entities which will 
benefit consumers.
3. Compound Authorizations for Research Uses and Disclosures
    We proposed to permit compound authorizations for the use or 
disclosure of protected health information for conditioned and 
unconditioned research activities provided that the authorization 
clearly differentiates between the conditioned and unconditioned 
research components and clearly allows the individual the option to opt 
in to the unconditioned research activities. We believed that the 
proposed provision would reduce burden and costs on the research 
community by eliminating the need for multiple forms for research 
studies involving both a clinical trial and a related biospecimen 
banking activity or study and by harmonizing the Privacy Rule's 
authorization requirements with the informed consent requirements under 
the Common Rule. This change to the Rule had long been sought by the 
research community. While we expected burden reduction and cost savings 
due to these modifications, we had no data which to quantify an 
estimate of such savings. We requested comment on the anticipated 
savings that this change would bring to the research community.
    As explained above, the final rule adopts the proposal to permit 
compound research authorizations. While almost all commenters on this 
topic were supportive and agreed that the change would result in 
reduced burdens and costs due to a reduction in forms and harmonization 
with the Common Rule, we did not receive significant comment that could 
inform our quantifying the anticipated cost-savings associated with 
this modification.
4. Authorizations for Future Research Uses or Disclosures
    We requested comment on the Department's previous interpretation 
that an authorization for research uses and disclosures must include a 
description of each purpose of the requested use or disclosure that is 
study specific, and the possibility of modifying this interpretation to 
allow for the authorization of future research uses and disclosures. We 
believed that this change in interpretation would reduce burden on 
covered entities and researchers by reducing the need for researchers 
to obtain multiple authorizations from the same individual for research 
and further harmonizing the Privacy Rule authorization requirements 
with the informed consent requirements under the Common Rule.
    The final rule adopts the new interpretation to allow covered 
entities to obtain authorizations for future research uses and 
disclosures to the extent such purposes are adequately described in the 
authorization such that it would be reasonable for the individual to 
expect that his or her protected health information could be used or 
disclosed for such future research. While we did receive comments 
supporting our assertions that permitting authorizations for future 
research uses and disclosures would reduce burden to covered entities 
and researchers by obviating the need for researchers to seek out past 
research participants to obtain authorization for future studies which 
they may be able to authorize at the initial time of enrollment into a 
study, and additionally by reducing the waivers of authorization that 
researchers would need to obtain from Institutional Review Boards, we 
did not receive specific comment on cost savings that could inform our 
quantifying the savings in this final rule.
5. Period of Protection for Decedent Information
    We proposed to modify the current rule to limit the period for 
which a covered entity must protect an individual's health information 
to 50 years after the individual's death. We believed this would reduce 
the burden on both covered entities and those seeking the protected 
health information of persons who have been deceased for many years by 
eliminating the need to search for and find a personal representative 
of the decedent, who in many cases may not be known or even exist after 
so many years, to authorize the disclosure. We believed this change 
would also benefit family members and historians who may seek access to 
the medical information of these decedents for personal and public 
interest reasons. However, we lacked any data to be able to estimate 
the benefits (or any unanticipated costs) of this provision and 
requested comment on these assertions.
    The final rule adopts the modification to limit the period of 
protection for decedent health information to 50 years after the date 
of death. While most comments responding to this proposal were very 
supportive of the change, agreeing with the anticipated benefits the 
Department had articulated (i.e., easier access to old or ancient 
patient health information by family, historians, archivists), the 
comments did not provide specific information that could inform our 
quantifying a cost-savings or reduction in burden associated with this 
change in policy.
    The Department did receive one comment asserting that covered 
entities may keep decedent information, particularly the information of 
famous individuals, for longer than 50 years past the date of death in 
order to monetize those records. The commenter cited an example of an 
x-ray of a deceased celebrity being sold at an auction for $45,000. 
However, we do not anticipate that this is or will be a typical 
scenario.
6. Disclosures About a Decedent
    We proposed to permit covered entities to disclose a decedent's 
protected health information to family members and others who were 
involved in the care or payment for care prior to the decedent's death, 
unless doing so is inconsistent with any prior expressed preference of 
the individual that is known to the covered entity. In the preamble to 
the proposed rule, we stated our belief that the proposed change would 
reduce burden by permitting covered entities to disclose protected 
health information about a decedent to family members and other persons 
who were involved in an individual's care while the individual was 
alive, without having to obtain written permission in the form of an 
authorization from the decedent's personal representative, who may not 
be known or even exist, and may be more difficult to locate as time 
passes. However, we had no data to permit us to estimate the reduction 
in burden and requested public comment on this issue.
    The final rule adopts the modification as proposed. However, as 
with the proposed rule, we are unable to quantify any cost-savings with 
respect this change. While commenters confirmed that permitting such 
disclosures would help facilitate communications with family members 
and other persons who were involved in an individual's care or payment 
for care prior to death, we did not receive any information that could 
inform estimating a savings.
7. Public Health Disclosures
    We proposed to create a new public health provision to permit 
disclosure of proof of a child's immunization by a covered entity to a 
school in States that have school entry or similar laws. This proposed 
change would have allowed a covered health care provider to release

[[Page 5684]]

proof of immunization to a school without having to obtain a written 
authorization, provided the provider obtained the agreement, which may 
be oral, to the disclosure from a parent, guardian or other person 
acting in loco parentis for the individual, or from the individual, if 
the individual was an adult or emancipated minor. We anticipated that 
the proposed change to the regulations would reduce the burden on 
parents, schools, and covered entities in obtaining and providing 
written authorizations, and would minimize the amount of school missed 
by students. However, because we lacked data on the burden reduction, 
we were unable to provide an estimate of the possible savings and 
requested comment on this point.
    The final rule adopts the proposal to permit covered entities to 
disclose, with the oral or written agreement of a parent or guardian, a 
child's proof of immunization to schools in States that have school 
entry or similar laws. This obviates the need for a covered entity to 
receive formal, executed HIPAA authorizations for such disclosures. 
While the final rule requires that covered entities document the 
agreement, the final rule is flexible and does not prescribe the nature 
of the documentation and does not require signature by the parent, 
allowing covered entities the flexibility to determine what is 
appropriate for their purposes. For example, as the preamble indicates 
above, if a parent or guardian submits a written or email request to a 
covered entity to disclose their child's immunization records to the 
child's school, a copy of the request would suffice as documentation of 
the agreement. Likewise, if a parent or guardian calls the covered 
entity and requests over the phone that their child's immunization 
records be disclosed to the child's school, a notation in the child's 
medical record or elsewhere of the phone call would suffice as 
documentation of the agreement.
    Given that the rule no longer requires a formal, executed HIPAA 
authorization for such disclosures and provides significant flexibility 
in the form of the documentation required of a parent's or guardian's 
agreement to the disclosure, this modification is expected to result in 
reduced burden and cost to covered health care providers in making 
these disclosures, as well as to the parents and schools involved in 
the process. We acknowledge that covered health care providers who wish 
to use these less formal processes in lieu of the authorization will 
need to explain their new procedure to office staff. However, given the 
provision's flexibility and narrow scope, we do not expect that the 
providers will need to do more than ensure office staff have a copy of 
the new procedure. Further, any one-time costs to develop and deploy 
the new procedure will be offset by the savings that are expected to 
accrue from the change over time as the disclosures are carried out. 
While we acknowledge the overall savings associated with this change, 
as with other provisions in this rule providing increased flexibility 
for compliance, we are unable to quantify them. For example, we do not 
have data on how many family doctors and other providers generally make 
these types of disclosures and how many requests such providers 
generally receive for proof of immunization, and we did not receive 
data from commenters that could inform our estimating savings in this 
area.

E. Additional Regulatory Analyses

1. Regulatory Flexibility Act
    The Regulatory Flexibility Act requires agencies to analyze and 
consider options for reducing regulatory burden if the regulation will 
impose a significant burden on a substantial number of small entities. 
The Act requires the head of the agency to either certify that the rule 
would not impose such a burden or perform a regulatory flexibility 
analysis and consider alternatives to lessen the burden.
    For the reasons stated below, it is not expected that the cost of 
compliance will be significant for small entities. Nor is it expected 
that the cost of compliance will fall disproportionately on small 
entities. Although many of the covered entities and business associates 
affected by the rule are small entities, they do not bear a 
disproportionate cost burden compared to the other entities subject to 
the rule. Further, with respect to small business associates, only the 
fraction of these entities that has not made a good faith effort to 
comply with existing requirements will experience additional costs 
under the rule. The Department did not receive any comments on its 
certification in the proposed rules. Therefore, the Secretary certifies 
that this rule will not have a significant economic impact on a 
substantial number of small entities.
    The RFA generally defines a ``small entity'' as (1) a proprietary 
firm meeting the size standards of the Small Business Administration 
(SBA), (2) a nonprofit organization that is not dominant in its field, 
or (3) a small government jurisdiction with a population of less than 
50,000. The SBA size standard for health care providers ranges between 
$7.0 million and $34.5 million in annual receipts. Because 90 percent 
or more of all health care providers meet the SBA size standard for a 
small business or are nonprofit organizations, we generally treat all 
health care providers as small entities for purposes of performing a 
regulatory flexibility analysis.
    With respect to health insurers and third party administrators, the 
SBA size standard is $7.0 million in annual receipts. While some 
insurers are classified as nonprofit, it is possible they are dominant 
in their market. For example, a number of Blue Cross/Blue Shield 
insurers are organized as nonprofit entities; yet they dominate the 
health insurance market in the States where they are licensed and 
therefore would not be considered small businesses. Using the SBA's 
definition of a small insurer as a business with less than $7 million 
in revenues, premiums earned as a measure of revenue,\42\ and data 
obtained from the National Association of Insurance Commissioners,\43\ 
the Department estimates that approximately 276 out of 730 insurers had 
revenues of less than $7 million.\44\
---------------------------------------------------------------------------

    \42\ U.S. Small Business Administration, ``Table of Small 
Business Standards Matched to North American Industry Classification 
System Codes,'' available at https://www.sba.gov/content/small-business-size-standards.
    \43\ HHS ASPE analysis of 2010 NAIC Supplemental Health Care 
Exhibit Data.
    \44\ These counts could be an overestimate. Only health 
insurance premiums from both the group and individual market were 
counted. If insurers also offered other types of insurance, their 
revenues could be higher.
---------------------------------------------------------------------------

    From the approximately $225.4 million (upper estimate) in costs we 
are able to identify, the cost per covered entity may be as low as $80 
(for the vast majority of covered entities) and as high as $843 (for 
those entities that experience a breach), and we estimate that the cost 
per affected business associate will be between $84.32 and $282. These 
costs are discussed in detail in the regulatory impact analysis and 
below. We do not view this as a significant burden because, for 
example, even the highest average compliance cost per covered entity we 
have identified ($843) represents just 0.0001% of annual revenues for a 
small entity with only $7 million in receipts (see the low end of SBA's 
size standard for health care providers). We include 750 third party 
administrators in the calculation of covered entities, to represent 
approximately 2.5 million ERISA plans,\45\ most of which are small 
entities, on whose behalf they carry our

[[Page 5685]]

compliance activities. We have no information on how many of these 
plans self-administer, and we did not receive any information from 
commenters in this area and so do not include a separate estimate for 
plans that self-administer.
---------------------------------------------------------------------------

    \45\ Source: 2010 Medical Expenditure Survey--Insurance 
Component.
---------------------------------------------------------------------------

    We estimate that the breach notification requirements will result 
in $14.5 million in annual costs to covered entities. Dividing that 
amount by the approximately 19,000 entities that will actually 
experience a breach of protected health information each year, we 
estimate that the costs of complying with the breach notification 
requirements will amount to, on average, $763 per covered entity that 
must respond to a breach. Smaller covered entities likely will face 
much lower costs, as these entities generally have protected health 
information for far fewer individuals than do larger covered entities 
and breach notification costs are closely linked to the number of 
individuals affected by a given breach incident.
    The other source of costs for covered entities arises from the 
requirement to provide revised NPPs to the individuals they serve. We 
estimate that the approximately 700,000 covered entities will 
experience total costs of approximately $55.9 million for compliance 
with the NPP requirements, or about $80 per covered entity.
    We estimate the costs for 200,000-400,000 business associates to 
come into full compliance with the Security Rule to be approximately 
$22.6-$113 million. The average cost per affected business associate 
would be approximately $198.
    Finally, we estimate that 250,000 to 500,000 business associates 
will incur costs totaling between $21 million and $42 million, 
respectively, to establish or significantly modify contracts with 
subcontractors to be in compliance with the rule's requirements for 
business associate agreements. The average cost per business associate 
would be approximately $84.
    Based on the relatively small cost per covered entity and per 
business associate, the Secretary certifies that the Rule will not have 
a significant impact on a substantial number of small entities. Still, 
we considered and adopted several solutions for reducing the burden on 
small entities.
    First, we combined several required rules into one rulemaking, 
which will allow affected entities to revise and distribute their 
notices of privacy practices at one time rather than multiple times, as 
each separate rule was published. Second, in the final rule we increase 
flexibility for health plans by allowing them to send the revised 
notices with their annual mailings rather than requiring plans to send 
them to individuals in a separate mailing.
    Third, we allow covered entities and business associates with 
existing HIPAA compliant contracts twelve months from the date of the 
rule to renegotiate their contracts unless the contract is otherwise 
renewed or modified before such date. This amount of time plus the 
eight months from the publication date of the rule to the compliance 
date generally gives the parties 20 months to renegotiate their 
agreements. We believe that the added time will reduce the cost to 
revise agreements because the changes the rule requires will be 
incorporated into the routine updating of covered entities' and 
business associates' contracts.
    Finally, the Department has also published on its web site sample 
language for revising the contracts between covered entities and 
business associates. While the language is generic and may not suit all 
entities and agreements, particularly larger entities and those with 
more complex business relationships, we believe that it will 
particularly help small entities with their contract revisions and save 
them time and money in redrafting their contracts to conform to the 
rule.
2. Unfunded Mandates Reform Act
    Section 202 of the Unfunded Mandates Reform Act of 1995 (UMRA) 
requires that agencies assess anticipated costs and benefits before 
issuing any rule whose mandates would require spending in any one year 
$100 million in 1995 dollars, updated annually for inflation. In 2011, 
that threshold is approximately $136 million. UMRA does not address the 
total cost of a rule. Rather, it focuses on certain categories of cost, 
mainly those ``Federal mandate'' costs resulting from: (1) Imposing 
enforceable duties on State, local, or Tribal governments, or on the 
private sector; or (2) increasing the stringency of conditions in, or 
decreasing the funding of, State, local, or Tribal governments under 
entitlement programs.
    We are able to identify between $114 and $225.4 million in costs on 
both the private sector and State and Federal entities for compliance 
with the final modifications to the HIPAA Privacy and Security Rules, 
and for compliance with the final Breach Notification Rule. As stated 
above, there may be other costs we are not able to monetize because we 
lack data, and the rule may produce savings that may offset some or all 
of the added costs. We must also separately identify costs to be 
incurred by the private sector and those incurred by State and Federal 
entities.
    Some of the costs of the regulation will fall on covered entities, 
which are primarily health care providers and health plans.\46\ For the 
purpose of these calculations, we included all provider costs as 
private sector costs. While we recognize that some providers are State 
or Federal entities, we do not have adequate information to estimate 
the number of public providers, but we believe the number to be 
significantly less than 10 percent of all providers shown in Table 1. 
Therefore, as we did for the RFA analysis and for ease of calculation, 
we assumed that all provider costs are private sector costs. We did not 
receive any comments on this assumption.
---------------------------------------------------------------------------

    \46\ Another type of covered entity, health care clearinghouses, 
generally will not bear these costs, as clearinghouses are not 
required to provide a notice of private practices to individuals and 
are involved in a miniscule fraction of breach incidents, if any.
---------------------------------------------------------------------------

    With respect to health plans, based on the data discussed in 
section C, we estimate that 60 percent of policy holders are served by 
private sector health plans and 40 percent of policy holders are served 
by public sector plans. Therefore, we attribute 60 percent of health 
plan costs to the private sector and 40 percent of plan costs to the 
public sector.
    The remaining costs of complying with the regulation will be borne 
by business associates of covered entities. We do not have data with 
which to estimate the numbers of private versus public entity business 
associates. However, we believe that the vast majority of, if not all, 
business associates, are private entities. Therefore, we assumed all 
business associate costs are private sector costs.
    Of the specific costs we can identify, we estimate that 
approximately 91 percent of all costs, or between $103.7 and $205 
million, will fall on private sector health care providers, health 
plans, and business associates. The remaining costs, approximately 
$10.3-20.4 million, will fall on public sector health plans. The 
following paragraphs outline the distribution of costs arising from the 
four cost-bearing elements of the final rule: (1) Covered entities must 
revise and distribute notices of privacy practices, (2) Covered 
entities that experience a breach of protected health information must 
comply with the breach notification requirements, (3) certain business 
associates must revise contracts with subcontractors to meet business 
associate agreement requirements, and (4) Certain business associates 
must make efforts to achieve full compliance with the administrative 
requirements of the Security Rule.

[[Page 5686]]

    We estimate the costs for to comply with the NPP provisions will 
reach about $55.9 million, which will be shared by providers and health 
plans. Providers will bear approximately $40.4 million of these costs, 
all of which we attribute to the private sector. Health plans will bear 
approximately $15.5 million and, as explained above, we have allocated 
60 percent of health plan costs for NPPs, or $9.3 million, as private 
sector costs. Public plans will bear the remaining $6.2 million.
    We estimate that private entities will bear 93 percent of the costs 
of compliance with the breach notification requirements, or about $13.5 
million. This is because the majority of breach reports are filed by 
health care providers, all of whose costs we attribute to the private 
sector. Consistent with our estimate that 60 percent of health plan 
members are enrolled in private sector plans, we also include as 
private costs 60 percent of the breach notification costs borne by 
health plans (based on the number of health plans that have filed 
breach reports).
    Finally, we estimate that all of the costs for business associates 
to create or revise business associate agreements with subcontractors 
($42 million outer estimate), and to come into full compliance with the 
Security Rule ($113 million outer estimate), will be private sector 
costs.
    As the estimated costs to private entities alone may exceed the 
$136 million threshold, UMRA requires us to prepare an analysis of the 
costs and benefits of the rule. We have already done so, in accordance 
with Executive Orders 12866 and 13563, and present this analysis in 
sections C and D.
3. Federalism
    Executive Order 13132 establishes certain requirements that an 
agency must meet when it promulgates a rule that imposes substantial 
direct requirement costs on State and local governments, preempts State 
law, or otherwise has Federalism implications.
    The Federalism implications of the Privacy and Security Rules were 
assessed as required by Executive Order 13132 and published as part of 
the preambles to the final rules on December 28, 2000 (65 FR 82462, 
82797) and February 20, 2003 (68 FR 8334, 8373), respectively. 
Regarding preemption, the preamble to the final Privacy Rule explains 
that the HIPAA statute dictates the relationship between State law and 
Privacy Rule requirements. Therefore, the Privacy Rule's preemption 
provisions do not raise Federalism issues. The HITECH Act, at section 
13421(a), provides that the HIPAA preemption provisions shall apply to 
the HITECH provisions and requirements. While we have made minor 
technical changes to the preemption provisions in Subpart B of Part 160 
to conform to and incorporate the HITECH Act preemption provisions, 
these changes do not raise new Federalism issues. The changes include: 
(1) Amending the definitions of ``contrary'' and ``more stringent'' to 
reference business associates; and (2) further amending the definition 
of contrary to provide that State law would be contrary to the HIPAA 
Administrative Simplification provisions if it stands as an obstacle to 
the accomplishment and execution of the full purposes and objectives of 
not only HIPAA, but also the HITECH Act.
    We do not believe that the rule will impose substantial direct 
compliance costs on State and local governments that are not required 
by statute. It is our understanding that State and local government 
covered entities do not engage in marketing, the sale of protected 
health information, or fundraising. Therefore, the modifications in 
these areas would not cause additional costs to State and local 
governments. We anticipate that the most significant direct costs on 
State and local governments will be the cost for State and local 
government-owned covered entities of drafting, printing, and 
distributing revised notices of privacy practices, which would include 
the cost of mailing these notices for State health plans, such as 
Medicaid. However, the costs involved can be attributed to the 
statutory requirements, which provide individuals with strengthened 
rights about which they need to be notified.
    In considering the principles in and requirements of Executive 
Order 13132, the Department has determined that these modifications to 
the Privacy and Security Rules will not significantly affect the 
rights, roles, and responsibilities of the States.

F. Accounting Statement

    Whenever a rule is considered a significant rule under Executive 
Order 12866, we are required to develop an accounting statement 
indicating the costs associated with promulgating the rule. Below, we 
present overall monetary annualized costs discounted at 3 percent and 7 
percent as described in the Regulatory Impact Analysis.

                                        Estimated Costs of the Final Rule
                                               [In 2011 millions]
----------------------------------------------------------------------------------------------------------------
                                                            Primary estimate  Minimum estimate  Maximum estimate
                    Costs (annualized)                            ($M)              ($M)              ($M)
----------------------------------------------------------------------------------------------------------------
Discounted @7%............................................              42.8              34.8              50.6
@3%.......................................................              35.2              28.7              41.7
----------------------------------------------------------------------------------------------------------------

    In the RIA, we acknowledged several potential sources of costs that 
we were unable to quantify. Because we have no way to determine the 
extent to which entities currently engage in certain activities for 
which they now need authorization, or who will need to take on a new 
burden because of the rule, we cannot predict the magnitude of these 
costs with any certainty. These potential sources of cost include:
    1. Potential lost revenue to covered entities who forgo making 
certain subsidized health-related communications to individuals rather 
than obtain those individuals' authorization for such communications;
    2. Costs to researchers to obtain authorization to make incentive 
payments (above the costs to prepare the data) to covered entities to 
produce data or, alternatively, a loss in revenue for covered entities 
who agree to accept only the costs to prepare and transmit the data;
    3. Potential costs to certain covered entities who purchase 
software or hardware to allow them to produce an electronic copy of 
individuals' protected health information; and
    4. The burden to some health care providers of ensuring that an 
individual's request to restrict a disclosure to a health plan is 
honored where it might not have been before the final rule.
    While we are certain the changes in this final rule also represent 
distinct

[[Page 5687]]

benefits to individuals with regard to the privacy and security of 
their health information, and with regard to their rights to that 
information, we are unable to quantify the benefits. Other expected 
qualitative benefits, which are described in detail above, include 
savings due to provisions simplifying and streamlining requirements and 
increasing flexibility. Such savings arise from:
    1. Eliminating the need for multiple forms for certain research 
studies by permitting compound authorizations;
    2. Obviating the need to find past research participants and obtain 
new authorizations for new research by allowing individuals to 
authorize future research uses and disclosures at the time of initial 
enrollment;
    3. Limiting the period of protection for decedent information to 
permit family members and historians to obtain information about a 
decedent without needing to find a personal representative of the 
deceased individual to authorize the disclosure;
    4. Permitting disclosures to a decedent's family members or others 
involved in the care or payment for care prior to the decedent's death; 
and
    5. Permitting covered entities to document a parent's informal 
agreement to disclose immunization information to a child's school 
rather than requiring a signed authorization form.

VIII. Collection of Information Requirements

    This final rule contains the following information collections 
(i.e., reporting, recordkeeping, and third-party disclosures) under the 
Paperwork Reduction Act. Some of those provisions involve changes from 
the information collections set out in the proposed and interim final 
rules. These changes are noted below.

A. Reporting

     Notification to the Secretary of breaches of unsecured 
protected health information (Sec.  164.408). In the final rule, we 
revise our estimated number of respondents and responses to reflect our 
experience administering the interim final rule.

B. Recordkeeping

     Documentation of safeguards and policies and procedures 
under the Security Rule (Sec.  164.316). In the proposed rule, we 
assumed that all business associates were in compliance with the 
Security Rule's documentation standard because of their contractual 
obligations to covered entities under the HIPAA Rules. In the final 
rule, we recognize that a minority of business associates, who have not 
previously maintained documentation of their policies and procedures 
and administrative safeguards under the Security Rule, may experience a 
burden coming into compliance with the documentation standard for the 
first time because they are now subject to direct liability under the 
Security Rule.
     Business Associate Agreements (Sec.  164.504(e)). We 
assumed in the proposed rule that business associates and their 
subcontractors were complying with their existing contractual 
obligations but acknowledged that some contracts would have to be 
modified to reflect changes in the law. We requested comments on how 
many entities would be unable able to revise contracts, in the normal 
course of business, within the phase-in period. We did not receive 
comments that would allow us to make a specific estimate; nonetheless, 
in the final rule we assume that a significant minority of business 
associates will need to revise their business associate agreements with 
subcontractors (or establish such agreements for the first time if they 
were not previously in compliance).

C. Third-Party Disclosures

     Breach notification to affected individuals and the media 
(Sec. Sec.  164.404 & 164.406). We revise our estimates of the numbers 
of breaches, covered entities, and individuals affected to reflect our 
experience in administering the breach notification requirements under 
the interim final rule.
     Revision and dissemination of notices of privacy practices 
for protected health information (Sec.  164.520). Our burden estimates 
for this provision in the proposed rule were based on the requirement 
for covered entities to send a separate mailing containing the new 
notice to each policy holder. As part of an effort to reduce overall 
burden, the final rule instead permits health plans to send the revised 
notice of privacy practices in their next annual mailing to policy 
holders, allowing them to avoid additional distribution burdens. We 
also revise the estimated number of affected covered entities based on 
updated information from the Department of Labor and the Small Business 
Administration.
    In addition to the changes summarized above, the information 
collections described in this final rule have been submitted to the 
Office of Management and Budget for review and approval.

List of Subjects

45 CFR Part 160

    Administrative practice and procedure, Computer technology, 
Electronic information system, Electronic transactions, Employer 
benefit plan, Health, Health care, Health facilities, Health insurance, 
Health records, Hospitals, Investigations, Medicaid, Medical research, 
Medicare, Penalties, Privacy, Reporting and record keeping 
requirements, Security.

45 CFR Part 164

    Administrative practice and procedure, Computer technology, 
Electronic information system, Electronic transactions, Employer 
benefit plan, Health, Health care, Health facilities, Health insurance, 
Health records, Hospitals, Medicaid, Medical research, Medicare, 
Privacy, Reporting and record keeping requirements, Security.

    For the reasons set forth in the preamble, the Department amends 45 
CFR Subtitle A, Subchapter C, parts 160 and 164, as set forth below:

PART 160--GENERAL ADMINISTRATIVE REQUIREMENTS

0
1. The authority citation for part 160 is revised to read as follows:

    Authority: 42 U.S.C. 1302(a); 42 U.S.C. 1320d-1320d-9; sec. 264, 
Pub. L. 104-191, 110 Stat. 2033-2034 (42 U.S.C. 1320d-2 (note)); 5 
U.S.C. 552; secs. 13400-13424, Pub. L. 111-5, 123 Stat. 258-279; and 
sec. 1104 of Pub. L. 111-148, 124 Stat. 146-154.


0
2. Revise Sec.  160.101 to read as follows:


Sec.  160.101  Statutory basis and purpose.

    The requirements of this subchapter implement sections 1171-1180 of 
the Social Security Act (the Act), sections 262 and 264 of Public Law 
104-191, section 105 of Public Law 110-233, sections 13400-13424 of 
Public Law 111-5, and section 1104 of Public Law 111-148.

0
3. Amend Sec.  160.102 as follows:
0
a. Redesignate paragraph (b) as paragraph (c); and
0
b. Add new paragraph (b) to read as follows:


Sec.  160.102  Applicability.

* * * * *
    (b) Where provided, the standards, requirements, and implementation 
specifications adopted under this subchapter apply to a business 
associate.
* * * * *

0
4. Amend Sec.  160.103 as follows:
0
a. Revise the definitions of ``Business associate'', ``Compliance 
date'',

[[Page 5688]]

``Disclosure'', ``Electronic media'', the introductory text of the 
definition of ``Health information'', paragraphs (1)(vi) through (xi), 
and (xv) of the definition of ``Health plan'', paragraph (2) of the 
definition of ``Protected health information,'' and the definitions of 
``Standard'', ``State'', and ``Workforce''; and
0
b. Add, in alphabetical order, new definitions of ``Administrative 
simplification provision'', ``ALJ'', ``Civil money penalty or 
penalty'', ``Family member'', ``Genetic information'', ``Genetic 
services'', ``Genetic test'', ``Manifestation or manifested'', 
``Respondent'', ``Subcontractor'', and ``Violation or violate''.
    The revisions and additions read as follows:


Sec.  160.103  Definitions.

* * * * *
    Administrative simplification provision means any requirement or 
prohibition established by:
    (1) 42 U.S.C. 1320d-1320d-4, 1320d-7, 1320d-8, and 1320d-9;
    (2) Section 264 of Pub. L. 104-191;
    (3) Sections 13400-13424 of Public Law 111-5; or
    (4) This subchapter.
    ALJ means Administrative Law Judge.
* * * * *
    Business associate: (1) Except as provided in paragraph (4) of this 
definition, business associate means, with respect to a covered entity, 
a person who:
    (i) On behalf of such covered entity or of an organized health care 
arrangement (as defined in this section) in which the covered entity 
participates, but other than in the capacity of a member of the 
workforce of such covered entity or arrangement, creates, receives, 
maintains, or transmits protected health information for a function or 
activity regulated by this subchapter, including claims processing or 
administration, data analysis, processing or administration, 
utilization review, quality assurance, patient safety activities listed 
at 42 CFR 3.20, billing, benefit management, practice management, and 
repricing; or
    (ii) Provides, other than in the capacity of a member of the 
workforce of such covered entity, legal, actuarial, accounting, 
consulting, data aggregation (as defined in Sec.  164.501 of this 
subchapter), management, administrative, accreditation, or financial 
services to or for such covered entity, or to or for an organized 
health care arrangement in which the covered entity participates, where 
the provision of the service involves the disclosure of protected 
health information from such covered entity or arrangement, or from 
another business associate of such covered entity or arrangement, to 
the person.
    (2) A covered entity may be a business associate of another covered 
entity.
    (3) Business associate includes:
    (i) A Health Information Organization, E-prescribing Gateway, or 
other person that provides data transmission services with respect to 
protected health information to a covered entity and that requires 
access on a routine basis to such protected health information.
    (ii) A person that offers a personal health record to one or more 
individuals on behalf of a covered entity.
    (iii) A subcontractor that creates, receives, maintains, or 
transmits protected health information on behalf of the business 
associate.
    (4) Business associate does not include:
    (i) A health care provider, with respect to disclosures by a 
covered entity to the health care provider concerning the treatment of 
the individual.
    (ii) A plan sponsor, with respect to disclosures by a group health 
plan (or by a health insurance issuer or HMO with respect to a group 
health plan) to the plan sponsor, to the extent that the requirements 
of Sec.  164.504(f) of this subchapter apply and are met.
    (iii) A government agency, with respect to determining eligibility 
for, or enrollment in, a government health plan that provides public 
benefits and is administered by another government agency, or 
collecting protected health information for such purposes, to the 
extent such activities are authorized by law.
    (iv) A covered entity participating in an organized health care 
arrangement that performs a function or activity as described by 
paragraph (1)(i) of this definition for or on behalf of such organized 
health care arrangement, or that provides a service as described in 
paragraph (1)(ii) of this definition to or for such organized health 
care arrangement by virtue of such activities or services.
    Civil money penalty or penalty means the amount determined under 
Sec.  160.404 of this part and includes the plural of these terms.
* * * * *
    Compliance date means the date by which a covered entity or 
business associate must comply with a standard, implementation 
specification, requirement, or modification adopted under this 
subchapter.
* * * * *
    Disclosure means the release, transfer, provision of access to, or 
divulging in any manner of information outside the entity holding the 
information.
* * * * *
    Electronic media means:
    (1) Electronic storage material on which data is or may be recorded 
electronically, including, for example, devices in computers (hard 
drives) and any removable/transportable digital memory medium, such as 
magnetic tape or disk, optical disk, or digital memory card;
    (2) Transmission media used to exchange information already in 
electronic storage media. Transmission media include, for example, the 
Internet, extranet or intranet, leased lines, dial-up lines, private 
networks, and the physical movement of removable/transportable 
electronic storage media. Certain transmissions, including of paper, 
via facsimile, and of voice, via telephone, are not considered to be 
transmissions via electronic media if the information being exchanged 
did not exist in electronic form immediately before the transmission.
* * * * *
    Family member means, with respect to an individual:
    (1) A dependent (as such term is defined in 45 CFR 144.103), of the 
individual; or
    (2) Any other person who is a first-degree, second-degree, third-
degree, or fourth-degree relative of the individual or of a dependent 
of the individual. Relatives by affinity (such as by marriage or 
adoption) are treated the same as relatives by consanguinity (that is, 
relatives who share a common biological ancestor). In determining the 
degree of the relationship, relatives by less than full consanguinity 
(such as half-siblings, who share only one parent) are treated the same 
as relatives by full consanguinity (such as siblings who share both 
parents).
    (i) First-degree relatives include parents, spouses, siblings, and 
children.
    (ii) Second-degree relatives include grandparents, grandchildren, 
aunts, uncles, nephews, and nieces.
    (iii) Third-degree relatives include great-grandparents, great-
grandchildren, great aunts, great uncles, and first cousins.
    (iv) Fourth-degree relatives include great-great grandparents, 
great-great grandchildren, and children of first cousins.
    Genetic information means:
    (1) Subject to paragraphs (2) and (3) of this definition, with 
respect to an individual, information about:
    (i) The individual's genetic tests;
    (ii) The genetic tests of family members of the individual;

[[Page 5689]]

    (iii) The manifestation of a disease or disorder in family members 
of such individual; or
    (iv) Any request for, or receipt of, genetic services, or 
participation in clinical research which includes genetic services, by 
the individual or any family member of the individual.
    (2) Any reference in this subchapter to genetic information 
concerning an individual or family member of an individual shall 
include the genetic information of:
    (i) A fetus carried by the individual or family member who is a 
pregnant woman; and
    (ii) Any embryo legally held by an individual or family member 
utilizing an assisted reproductive technology.
    (3) Genetic information excludes information about the sex or age 
of any individual.
    Genetic services means:
    (1) A genetic test;
    (2) Genetic counseling (including obtaining, interpreting, or 
assessing genetic information); or
    (3) Genetic education.
    Genetic test means an analysis of human DNA, RNA, chromosomes, 
proteins, or metabolites, if the analysis detects genotypes, mutations, 
or chromosomal changes. Genetic test does not include an analysis of 
proteins or metabolites that is directly related to a manifested 
disease, disorder, or pathological condition.
* * * * *
    Health information means any information, including genetic 
information, whether oral or recorded in any form or medium, that: * * 
*
* * * * *
    Health plan means * * *
    (1) * * *
    (vi) The Voluntary Prescription Drug Benefit Program under Part D 
of title XVIII of the Act, 42 U.S.C. 1395w-101 through 1395w-152.
    (vii) An issuer of a Medicare supplemental policy (as defined in 
section 1882(g)(1) of the Act, 42 U.S.C. 1395ss(g)(1)).
    (viii) An issuer of a long-term care policy, excluding a nursing 
home fixed indemnity policy.
    (ix) An employee welfare benefit plan or any other arrangement that 
is established or maintained for the purpose of offering or providing 
health benefits to the employees of two or more employers.
    (x) The health care program for uniformed services under title 10 
of the United States Code.
    (xi) The veterans health care program under 38 U.S.C. chapter 17.
* * * * *
    (xv) The Medicare Advantage program under Part C of title XVIII of 
the Act, 42 U.S.C. 1395w-21 through 1395w-28.
* * * * *
    Manifestation or manifested means, with respect to a disease, 
disorder, or pathological condition, that an individual has been or 
could reasonably be diagnosed with the disease, disorder, or 
pathological condition by a health care professional with appropriate 
training and expertise in the field of medicine involved. For purposes 
of this subchapter, a disease, disorder, or pathological condition is 
not manifested if the diagnosis is based principally on genetic 
information.
* * * * *
    Protected health information * * *
    (2) Protected health information excludes individually identifiable 
health information:
    (i) In education records covered by the Family Educational Rights 
and Privacy Act, as amended, 20 U.S.C. 1232g;
    (ii) In records described at 20 U.S.C. 1232g(a)(4)(B)(iv);
    (iii) In employment records held by a covered entity in its role as 
employer; and
    (iv) Regarding a person who has been deceased for more than 50 
years.
* * * * *
    Respondent means a covered entity or business associate upon which 
the Secretary has imposed, or proposes to impose, a civil money 
penalty.
* * * * *
    Standard means a rule, condition, or requirement:
    (1) Describing the following information for products, systems, 
services, or practices:
    (i) Classification of components;
    (ii) Specification of materials, performance, or operations; or
    (iii) Delineation of procedures; or
    (2) With respect to the privacy of protected health information.
* * * * *
    State refers to one of the following:
    (1) For a health plan established or regulated by Federal law, 
State has the meaning set forth in the applicable section of the United 
States Code for such health plan.
    (2) For all other purposes, State means any of the several States, 
the District of Columbia, the Commonwealth of Puerto Rico, the Virgin 
Islands, Guam, American Samoa, and the Commonwealth of the Northern 
Mariana Islands.
    Subcontractor means a person to whom a business associate delegates 
a function, activity, or service, other than in the capacity of a 
member of the workforce of such business associate.
* * * * *
    Violation or violate means, as the context may require, failure to 
comply with an administrative simplification provision.
    Workforce means employees, volunteers, trainees, and other persons 
whose conduct, in the performance of work for a covered entity or 
business associate, is under the direct control of such covered entity 
or business associate, whether or not they are paid by the covered 
entity or business associate.

0
5. Add Sec.  160.105 to subpart A to read as follows:


Sec.  160.105  Compliance dates for implementation of new or modified 
standards and implementation specifications.

    Except as otherwise provided, with respect to rules that adopt new 
standards and implementation specifications or modifications to 
standards and implementation specifications in this subchapter in 
accordance with Sec.  160.104 that become effective after January 25, 
2013, covered entities and business associates must comply with the 
applicable new standards and implementation specifications, or 
modifications to standards and implementation specifications, no later 
than 180 days from the effective date of any such standards or 
implementation specifications.

0
6. Revise Sec.  160.201 to read as follows:


Sec.  160.201  Statutory basis.

    The provisions of this subpart implement section 1178 of the Act, 
section 262 of Public Law 104-191, section 264(c) of Public Law 104-
191, and section 13421(a) of Public Law 111-5.

0
7. In Sec.  160.202, revise the definition of ``Contrary'' and 
paragraph (1)(i) of the definition of ``More stringent'' to read as 
follows:


Sec.  160.202  Definitions.

* * * * *
    Contrary, when used to compare a provision of State law to a 
standard, requirement, or implementation specification adopted under 
this subchapter, means:
    (1) A covered entity or business associate would find it impossible 
to comply with both the State and Federal requirements; or
    (2) The provision of State law stands as an obstacle to the 
accomplishment and execution of the full purposes and objectives of 
part C of title XI of the Act,

[[Page 5690]]

section 264 of Public Law 104-191, or sections 13400-13424 of Public 
Law 111-5, as applicable.
    More stringent * * *
    (1) * * *
    (i) Required by the Secretary in connection with determining 
whether a covered entity or business associate is in compliance with 
this subchapter; or
* * * * *

0
8. Revise Sec.  160.300 to read as follows:


Sec.  160.300  Applicability.

    This subpart applies to actions by the Secretary, covered entities, 
business associates, and others with respect to ascertaining the 
compliance by covered entities and business associates with, and the 
enforcement of, the applicable provisions of this part 160 and parts 
162 and 164 of this subchapter.


Sec.  160.302  [Removed and Reserved]

0
9. Remove and reserve Sec.  160.302.

0
10. Revise Sec.  160.304 to read as follows:


Sec.  160.304  Principles for achieving compliance.

    (a) Cooperation. The Secretary will, to the extent practicable and 
consistent with the provisions of this subpart, seek the cooperation of 
covered entities and business associates in obtaining compliance with 
the applicable administrative simplification provisions.
    (b) Assistance. The Secretary may provide technical assistance to 
covered entities and business associates to help them comply 
voluntarily with the applicable administrative simplification 
provisions.

0
11. In Sec.  160.306, revise paragraphs (a) and (c) to read as follows:


Sec.  160.306  Complaints to the Secretary.

    (a) Right to file a complaint. A person who believes a covered 
entity or business associate is not complying with the administrative 
simplification provisions may file a complaint with the Secretary.
* * * * *
    (c) Investigation. (1) The Secretary will investigate any complaint 
filed under this section when a preliminary review of the facts 
indicates a possible violation due to willful neglect.
    (2) The Secretary may investigate any other complaint filed under 
this section.
    (3) An investigation under this section may include a review of the 
pertinent policies, procedures, or practices of the covered entity or 
business associate and of the circumstances regarding any alleged 
violation.
    (4) At the time of the initial written communication with the 
covered entity or business associate about the complaint, the Secretary 
will describe the acts and/or omissions that are the basis of the 
complaint.

0
12. Revise Sec.  160.308 to read as follows:


Sec.  160.308  Compliance reviews.

    (a) The Secretary will conduct a compliance review to determine 
whether a covered entity or business associate is complying with the 
applicable administrative simplification provisions when a preliminary 
review of the facts indicates a possible violation due to willful 
neglect.
    (b) The Secretary may conduct a compliance review to determine 
whether a covered entity or business associate is complying with the 
applicable administrative simplification provisions in any other 
circumstance.

0
13. Revise Sec.  160.310 to read as follows:


Sec.  160.310  Responsibilities of covered entities and business 
associates.

    (a) Provide records and compliance reports. A covered entity or 
business associate must keep such records and submit such compliance 
reports, in such time and manner and containing such information, as 
the Secretary may determine to be necessary to enable the Secretary to 
ascertain whether the covered entity or business associate has complied 
or is complying with the applicable administrative simplification 
provisions.
    (b) Cooperate with complaint investigations and compliance reviews. 
A covered entity or business associate must cooperate with the 
Secretary, if the Secretary undertakes an investigation or compliance 
review of the policies, procedures, or practices of the covered entity 
or business associate to determine whether it is complying with the 
applicable administrative simplification provisions.
    (c) Permit access to information. (1) A covered entity or business 
associate must permit access by the Secretary during normal business 
hours to its facilities, books, records, accounts, and other sources of 
information, including protected health information, that are pertinent 
to ascertaining compliance with the applicable administrative 
simplification provisions. If the Secretary determines that exigent 
circumstances exist, such as when documents may be hidden or destroyed, 
a covered entity or business associate must permit access by the 
Secretary at any time and without notice.
    (2) If any information required of a covered entity or business 
associate under this section is in the exclusive possession of any 
other agency, institution, or person and the other agency, institution, 
or person fails or refuses to furnish the information, the covered 
entity or business associate must so certify and set forth what efforts 
it has made to obtain the information.
    (3) Protected health information obtained by the Secretary in 
connection with an investigation or compliance review under this 
subpart will not be disclosed by the Secretary, except if necessary for 
ascertaining or enforcing compliance with the applicable administrative 
simplification provisions, if otherwise required by law, or if 
permitted under 5 U.S.C. 552a(b)(7).

0
14. Revise Sec.  160.312 to read as follows:


Sec.  160.312  Secretarial action regarding complaints and compliance 
reviews.

    (a) Resolution when noncompliance is indicated. (1) If an 
investigation of a complaint pursuant to Sec.  160.306 or a compliance 
review pursuant to Sec.  160.308 indicates noncompliance, the Secretary 
may attempt to reach a resolution of the matter satisfactory to the 
Secretary by informal means. Informal means may include demonstrated 
compliance or a completed corrective action plan or other agreement.
    (2) If the matter is resolved by informal means, the Secretary will 
so inform the covered entity or business associate and, if the matter 
arose from a complaint, the complainant, in writing.
    (3) If the matter is not resolved by informal means, the Secretary 
will--
    (i) So inform the covered entity or business associate and provide 
the covered entity or business associate an opportunity to submit 
written evidence of any mitigating factors or affirmative defenses for 
consideration under Sec. Sec.  160.408 and 160.410 of this part. The 
covered entity or business associate must submit any such evidence to 
the Secretary within 30 days (computed in the same manner as prescribed 
under Sec.  160.526 of this part) of receipt of such notification; and
    (ii) If, following action pursuant to paragraph (a)(3)(i) of this 
section, the Secretary finds that a civil money penalty should be 
imposed, inform the covered entity or business associate of such 
finding in a notice of proposed determination in accordance with Sec.  
160.420 of this part.
    (b) Resolution when no violation is found. If, after an 
investigation pursuant to Sec.  160.306 or a compliance review pursuant 
to Sec.  160.308, the Secretary determines that further action is not

[[Page 5691]]

warranted, the Secretary will so inform the covered entity or business 
associate and, if the matter arose from a complaint, the complainant, 
in writing.

0
15. In Sec.  160.316, revise the introductory text to read as follows:


Sec.  160.316  Refraining from intimidation or retaliation.

    A covered entity or business associate may not threaten, 
intimidate, coerce, harass, discriminate against, or take any other 
retaliatory action against any individual or other person for--
* * * * *

0
16. In Sec.  160.401, revise the definition of ``Reasonable cause'' to 
read as follows:


Sec.  160.401  Definitions.

* * * * *
    Reasonable cause means an act or omission in which a covered entity 
or business associate knew, or by exercising reasonable diligence would 
have known, that the act or omission violated an administrative 
simplification provision, but in which the covered entity or business 
associate did not act with willful neglect.
* * * * *

0
17. Revise Sec.  160.402 to read as follows:


Sec.  160.402  Basis for a civil money penalty.

    (a) General rule. Subject to Sec.  160.410, the Secretary will 
impose a civil money penalty upon a covered entity or business 
associate if the Secretary determines that the covered entity or 
business associate has violated an administrative simplification 
provision.
    (b) Violation by more than one covered entity or business 
associate. (1) Except as provided in paragraph (b)(2) of this section, 
if the Secretary determines that more than one covered entity or 
business associate was responsible for a violation, the Secretary will 
impose a civil money penalty against each such covered entity or 
business associate.
    (2) A covered entity that is a member of an affiliated covered 
entity, in accordance with Sec.  164.105(b) of this subchapter, is 
jointly and severally liable for a civil money penalty for a violation 
of part 164 of this subchapter based on an act or omission of the 
affiliated covered entity, unless it is established that another member 
of the affiliated covered entity was responsible for the violation.
    (c) Violation attributed to a covered entity or business associate. 
(1) A covered entity is liable, in accordance with the Federal common 
law of agency, for a civil money penalty for a violation based on the 
act or omission of any agent of the covered entity, including a 
workforce member or business associate, acting within the scope of the 
agency.
    (2) A business associate is liable, in accordance with the Federal 
common law of agency, for a civil money penalty for a violation based 
on the act or omission of any agent of the business associate, 
including a workforce member or subcontractor, acting within the scope 
of the agency.

0
18. In Sec.  160.404, revise the introductory text of paragraphs 
(b)(2)(i), (b)(2)(iii), and (b)(2)(iv) to read as follows:


Sec.  160.404  Amount of a civil money penalty.

* * * * *
    (b) * * *
    (2) * * *
    (i) For a violation in which it is established that the covered 
entity or business associate did not know and, by exercising reasonable 
diligence, would not have known that the covered entity or business 
associate violated such provision,
* * * * *
    (iii) For a violation in which it is established that the violation 
was due to willful neglect and was corrected during the 30-day period 
beginning on the first date the covered entity or business associate 
liable for the penalty knew, or, by exercising reasonable diligence, 
would have known that the violation occurred,
* * * * *
    (iv) For a violation in which it is established that the violation 
was due to willful neglect and was not corrected during the 30-day 
period beginning on the first date the covered entity or business 
associate liable for the penalty knew, or, by exercising reasonable 
diligence, would have known that the violation occurred,
* * * * *

0
19. Revise Sec.  160.406 to read as follows:


Sec.  160.406  Violations of an identical requirement or prohibition.

    The Secretary will determine the number of violations of an 
administrative simplification provision based on the nature of the 
covered entity's or business associate's obligation to act or not act 
under the provision that is violated, such as its obligation to act in 
a certain manner, or within a certain time, or to act or not act with 
respect to certain persons. In the case of continuing violation of a 
provision, a separate violation occurs each day the covered entity or 
business associate is in violation of the provision.

0
20. Revise Sec.  160.408 to read as follows:


Sec.  160.408  Factors considered in determining the amount of a civil 
money penalty.

    In determining the amount of any civil money penalty, the Secretary 
will consider the following factors, which may be mitigating or 
aggravating as appropriate:
    (a) The nature and extent of the violation, consideration of which 
may include but is not limited to:
    (1) The number of individuals affected; and
    (2) The time period during which the violation occurred;
    (b) The nature and extent of the harm resulting from the violation, 
consideration of which may include but is not limited to:
    (1) Whether the violation caused physical harm;
    (2) Whether the violation resulted in financial harm;
    (3) Whether the violation resulted in harm to an individual's 
reputation; and
    (4) Whether the violation hindered an individual's ability to 
obtain health care;
    (c) The history of prior compliance with the administrative 
simplification provisions, including violations, by the covered entity 
or business associate, consideration of which may include but is not 
limited to:
    (1) Whether the current violation is the same or similar to 
previous indications of noncompliance;
    (2) Whether and to what extent the covered entity or business 
associate has attempted to correct previous indications of 
noncompliance;
    (3) How the covered entity or business associate has responded to 
technical assistance from the Secretary provided in the context of a 
compliance effort; and
    (4) How the covered entity or business associate has responded to 
prior complaints;
    (d) The financial condition of the covered entity or business 
associate, consideration of which may include but is not limited to:
    (1) Whether the covered entity or business associate had financial 
difficulties that affected its ability to comply;
    (2) Whether the imposition of a civil money penalty would 
jeopardize the ability of the covered entity or business associate to 
continue to provide, or to pay for, health care; and
    (3) The size of the covered entity or business associate; and
    (e) Such other matters as justice may require.

[[Page 5692]]


0
21. Revise Sec.  160.410 to read as follows:


Sec.  160.410  Affirmative defenses.

    (a) The Secretary may not:
    (1) Prior to February 18, 2011, impose a civil money penalty on a 
covered entity or business associate for an act that violates an 
administrative simplification provision if the covered entity or 
business associate establishes that the violation is punishable under 
42 U.S.C. 1320d-6.
    (2) On or after February 18, 2011, impose a civil money penalty on 
a covered entity or business associate for an act that violates an 
administrative simplification provision if the covered entity or 
business associate establishes that a penalty has been imposed under 42 
U.S.C. 1320d-6 with respect to such act.
    (b) For violations occurring prior to February 18, 2009, the 
Secretary may not impose a civil money penalty on a covered entity for 
a violation if the covered entity establishes that an affirmative 
defense exists with respect to the violation, including the following:
    (1) The covered entity establishes, to the satisfaction of the 
Secretary, that it did not have knowledge of the violation, determined 
in accordance with the Federal common law of agency, and by exercising 
reasonable diligence, would not have known that the violation occurred; 
or
    (2) The violation is--
    (i) Due to circumstances that would make it unreasonable for the 
covered entity, despite the exercise of ordinary business care and 
prudence, to comply with the administrative simplification provision 
violated and is not due to willful neglect; and
    (ii) Corrected during either:
    (A) The 30-day period beginning on the first date the covered 
entity liable for the penalty knew, or by exercising reasonable 
diligence would have known, that the violation occurred; or
    (B) Such additional period as the Secretary determines to be 
appropriate based on the nature and extent of the failure to comply.
    (c) For violations occurring on or after February 18, 2009, the 
Secretary may not impose a civil money penalty on a covered entity or 
business associate for a violation if the covered entity or business 
associate establishes to the satisfaction of the Secretary that the 
violation is--
    (1) Not due to willful neglect; and
    (2) Corrected during either:
    (i) The 30-day period beginning on the first date the covered 
entity or business associate liable for the penalty knew, or, by 
exercising reasonable diligence, would have known that the violation 
occurred; or
    (ii) Such additional period as the Secretary determines to be 
appropriate based on the nature and extent of the failure to comply.

0
22. Revise Sec.  160.412 to read as follows:


Sec.  160.412  Waiver.

    For violations described in Sec.  160.410(b)(2) or (c) that are not 
corrected within the period specified under such paragraphs, the 
Secretary may waive the civil money penalty, in whole or in part, to 
the extent that the payment of the penalty would be excessive relative 
to the violation.

0
23. Revise Sec.  160.418 to read as follows:


Sec.  160.418  Penalty not exclusive.

    Except as otherwise provided by 42 U.S.C. 1320d-5(b)(1) and 42 
U.S.C. 299b-22(f)(3), a penalty imposed under this part is in addition 
to any other penalty prescribed by law.

0
24. Amend Sec.  160.534 as follows:
0
a. Revise paragraph (b)(1)(iii);
0
b. Add paragraph (b)(1)(iv); and
0
c. Revise paragraph (b)(2).
    The revisions read as follows:


Sec.  160.534  The hearing.

* * * * *
    (b)(1) * * *
    (iii) Claim that a proposed penalty should be reduced or waived 
pursuant to Sec.  160.412 of this part; and
    (iv) Compliance with subpart D of part 164, as provided under Sec.  
164.414(b).
    (2) The Secretary has the burden of going forward and the burden of 
persuasion with respect to all other issues, including issues of 
liability other than with respect to subpart D of part 164, and the 
existence of any factors considered aggravating factors in determining 
the amount of the proposed penalty.
* * * * *

PART 164--SECURITY AND PRIVACY

0
25. The authority citation for part 164 is revised to read as follows:

    Authority: 42 U.S.C. 1302(a); 42 U.S.C. 1320d-1320d-9; sec. 264, 
Pub. L. 104-191, 110 Stat. 2033-2034 (42 U.S.C. 1320d-2(note)); and 
secs. 13400-13424, Pub. L. 111-5, 123 Stat. 258-279.

0
26. Revise Sec.  164.102 to read as follows:


Sec.  164.102  Statutory basis.

    The provisions of this part are adopted pursuant to the Secretary's 
authority to prescribe standards, requirements, and implementation 
specifications under part C of title XI of the Act, section 264 of 
Public Law 104-191, and sections 13400-13424 of Public Law 111-5.

0
27. In Sec.  164.104, revise paragraph (b) to read as follows:


Sec.  164.104  Applicability.

* * * * *
    (b) Where provided, the standards, requirements, and implementation 
specifications adopted under this part apply to a business associate.

0
28. Amend Sec.  164.105 as follows:
0
a. Revise the introductory text of paragraph (a)(1), the introductory 
text of paragraph (a)(2)(i), paragraph (a)(2)(ii), the introductory 
text of paragraph (a)(2)(iii), and paragraphs (a)(2)(iii)(A) and (B);
0
b. Redesignate paragraph (a)(2)(iii)(C) as paragraph (a)(2)(iii)(D) and 
add new paragraph (a)(2)(iii)(C);
0
c. Revise newly redesignated paragraph (a)(2)(iii)(D); and
0
d. Revise paragraph (b).
    The revisions read as follows:


Sec.  164.105  Organizational requirements.

    (a)(1) Standard: Health care component. If a covered entity is a 
hybrid entity, the requirements of this part, other than the 
requirements of this section, Sec.  164.314, and Sec.  164.504, apply 
only to the health care component(s) of the entity, as specified in 
this section.
    (2) * * *
    (i) Application of other provisions. In applying a provision of 
this part, other than the requirements of this section, Sec.  164.314, 
and Sec.  164.504, to a hybrid entity:
* * * * *
    (ii) Safeguard requirements. The covered entity that is a hybrid 
entity must ensure that a health care component of the entity complies 
with the applicable requirements of this part. In particular, and 
without limiting this requirement, such covered entity must ensure 
that:
    (A) Its health care component does not disclose protected health 
information to another component of the covered entity in circumstances 
in which subpart E of this part would prohibit such disclosure if the 
health care component and the other component were separate and 
distinct legal entities;
    (B) Its health care component protects electronic protected health 
information with respect to another component of the covered entity to 
the same extent that it would be required under subpart C of this part 
to protect such information if the health care

[[Page 5693]]

component and the other component were separate and distinct legal 
entities;
    (C) If a person performs duties for both the health care component 
in the capacity of a member of the workforce of such component and for 
another component of the entity in the same capacity with respect to 
that component, such workforce member must not use or disclose 
protected health information created or received in the course of or 
incident to the member's work for the health care component in a way 
prohibited by subpart E of this part.
    (iii) Responsibilities of the covered entity. A covered entity that 
is a hybrid entity has the following responsibilities:
    (A) For purposes of subpart C of part 160 of this subchapter, 
pertaining to compliance and enforcement, the covered entity has the 
responsibility of complying with this part.
    (B) The covered entity is responsible for complying with Sec.  
164.316(a) and Sec.  164.530(i), pertaining to the implementation of 
policies and procedures to ensure compliance with applicable 
requirements of this part, including the safeguard requirements in 
paragraph (a)(2)(ii) of this section.
    (C) The covered entity is responsible for complying with Sec.  
164.314 and Sec.  164.504 regarding business associate arrangements and 
other organizational requirements.
    (D) The covered entity is responsible for designating the 
components that are part of one or more health care components of the 
covered entity and documenting the designation in accordance with 
paragraph (c) of this section, provided that, if the covered entity 
designates one or more health care components, it must include any 
component that would meet the definition of a covered entity or 
business associate if it were a separate legal entity. Health care 
component(s) also may include a component only to the extent that it 
performs covered functions.
    (b)(1) Standard: Affiliated covered entities. Legally separate 
covered entities that are affiliated may designate themselves as a 
single covered entity for purposes of this part.
    (2) Implementation specifications.
    (i) Requirements for designation of an affiliated covered entity.
    (A) Legally separate covered entities may designate themselves 
(including any health care component of such covered entity) as a 
single affiliated covered entity, for purposes of this part, if all of 
the covered entities designated are under common ownership or control.
    (B) The designation of an affiliated covered entity must be 
documented and the documentation maintained as required by paragraph 
(c) of this section.
    (ii) Safeguard requirements. An affiliated covered entity must 
ensure that it complies with the applicable requirements of this part, 
including, if the affiliated covered entity combines the functions of a 
health plan, health care provider, or health care clearinghouse, Sec.  
164.308(a)(4)(ii)(A) and Sec.  164.504(g), as applicable.
* * * * *

0
29. Revise Sec.  164.106 to read as follows:


Sec.  164.106  Relationship to other parts.

    In complying with the requirements of this part, covered entities 
and, where provided, business associates, are required to comply with 
the applicable provisions of parts 160 and 162 of this subchapter.

0
30. The authority citation for subpart C of part 164 is revised to read 
as follows:

    Authority: 42 U.S.C. 1320d-2 and 1320d-4; sec. 13401, Pub. L. 
111-5, 123 Stat. 260.


0
31. Revise Sec.  164.302 to read as follows:


Sec.  164.302  Applicability.

    A covered entity or business associate must comply with the 
applicable standards, implementation specifications, and requirements 
of this subpart with respect to electronic protected health information 
of a covered entity.

0
32. In Sec.  164.304, revise the definitions of ``Administrative 
safeguards'' and ``Physical safeguards'' to read as follows:


Sec.  164.304  Definitions.

* * * * *
    Administrative safeguards are administrative actions, and policies 
and procedures, to manage the selection, development, implementation, 
and maintenance of security measures to protect electronic protected 
health information and to manage the conduct of the covered entity's or 
business associate's workforce in relation to the protection of that 
information.
* * * * *
    Physical safeguards are physical measures, policies, and procedures 
to protect a covered entity's or business associate's electronic 
information systems and related buildings and equipment, from natural 
and environmental hazards, and unauthorized intrusion.
* * * * *

0
33. Amend Sec.  164.306 as follows:
0
a. Revise the introductory text of paragraph (a) and paragraph (a)(1);
0
b. Revise paragraph (b)(1), the introductory text of paragraph (b)(2), 
and paragraphs (b)(2)(i) and (b)(2)(ii);
0
c. Revise paragraph (c);
0
d. Revise paragraph (d)(2), the introductory text of paragraph (d)(3), 
paragraph (d)(3)(i), and the introductory text of paragraph (d)(3)(ii); 
and
0
e. Revise paragraph (e).
    The revisions read as follows:


Sec.  164.306  Security standards: General rules.

    (a) General requirements. Covered entities and business associates 
must do the following:
    (1) Ensure the confidentiality, integrity, and availability of all 
electronic protected health information the covered entity or business 
associate creates, receives, maintains, or transmits.
* * * * *
    (b) * * *
    (1) Covered entities and business associates may use any security 
measures that allow the covered entity or business associate to 
reasonably and appropriately implement the standards and implementation 
specifications as specified in this subpart.
    (2) In deciding which security measures to use, a covered entity or 
business associate must take into account the following factors:
    (i) The size, complexity, and capabilities of the covered entity or 
business associate.
    (ii) The covered entity's or the business associate's technical 
infrastructure, hardware, and software security capabilities.
* * * * *
    (c) Standards. A covered entity or business associate must comply 
with the applicable standards as provided in this section and in Sec.  
164.308, Sec.  164.310, Sec.  164.312, Sec.  164.314 and Sec.  164.316 
with respect to all electronic protected health information.
    (d) * * *
    (2) When a standard adopted in Sec.  164.308, Sec.  164.310, Sec.  
164.312, Sec.  164.314, or Sec.  164.316 includes required 
implementation specifications, a covered entity or business associate 
must implement the implementation specifications.
    (3) When a standard adopted in Sec.  164.308, Sec.  164.310, Sec.  
164.312, Sec.  164.314, or Sec.  164.316 includes addressable 
implementation specifications, a covered entity or business associate 
must--
    (i) Assess whether each implementation specification is a

[[Page 5694]]

reasonable and appropriate safeguard in its environment, when analyzed 
with reference to the likely contribution to protecting electronic 
protected health information; and
    (ii) As applicable to the covered entity or business associate--
* * * * *
    (e) Maintenance. A covered entity or business associate must review 
and modify the security measures implemented under this subpart as 
needed to continue provision of reasonable and appropriate protection 
of electronic protected health information, and update documentation of 
such security measures in accordance with Sec.  164.316(b)(2)(iii).

0
34. Amend Sec.  164.308 as follows:
0
a. Revise the introductory text of paragraph (a), paragraph 
(a)(1)(ii)(A), paragraph (a)(1)(ii)(C), paragraph (a)(2), paragraph 
(a)(3)(ii)(C), paragraph (a)(4)(ii)(C), paragraph (a)(6)(ii), and 
paragraph (a)(8); and
0
b. Revise paragraph (b).
    The revisions read as follows:


Sec.  164.308  Administrative safeguards.

    (a) A covered entity or business associate must, in accordance with 
Sec.  164.306:
    (1) * * *
    (ii) * * *
    (A) Risk analysis (Required). Conduct an accurate and thorough 
assessment of the potential risks and vulnerabilities to the 
confidentiality, integrity, and availability of electronic protected 
health information held by the covered entity or business associate.
* * * * *
    (C) Sanction policy (Required). Apply appropriate sanctions against 
workforce members who fail to comply with the security policies and 
procedures of the covered entity or business associate.
* * * * *
    (2) Standard: Assigned security responsibility. Identify the 
security official who is responsible for the development and 
implementation of the policies and procedures required by this subpart 
for the covered entity or business associate.
    (3) * * *
    (ii) * * *
    (C) Termination procedures (Addressable). Implement procedures for 
terminating access to electronic protected health information when the 
employment of, or other arrangement with, a workforce member ends or as 
required by determinations made as specified in paragraph (a)(3)(ii)(B) 
of this section.
    (4) * * *
    (ii) * * *
    (C) Access establishment and modification (Addressable). Implement 
policies and procedures that, based upon the covered entity's or the 
business associate's access authorization policies, establish, 
document, review, and modify a user's right of access to a workstation, 
transaction, program, or process.
* * * * *
    (6) * * *
    (ii) Implementation specification: Response and reporting 
(Required). Identify and respond to suspected or known security 
incidents; mitigate, to the extent practicable, harmful effects of 
security incidents that are known to the covered entity or business 
associate; and document security incidents and their outcomes.
* * * * *
    (8) Standard: Evaluation. Perform a periodic technical and 
nontechnical evaluation, based initially upon the standards implemented 
under this rule and, subsequently, in response to environmental or 
operational changes affecting the security of electronic protected 
health information, that establishes the extent to which a covered 
entity's or business associate's security policies and procedures meet 
the requirements of this subpart.
    (b)(1) Business associate contracts and other arrangements. A 
covered entity may permit a business associate to create, receive, 
maintain, or transmit electronic protected health information on the 
covered entity's behalf only if the covered entity obtains satisfactory 
assurances, in accordance with Sec.  164.314(a), that the business 
associate will appropriately safeguard the information. A covered 
entity is not required to obtain such satisfactory assurances from a 
business associate that is a subcontractor.
    (2) A business associate may permit a business associate that is a 
subcontractor to create, receive, maintain, or transmit electronic 
protected health information on its behalf only if the business 
associate obtains satisfactory assurances, in accordance with Sec.  
164.314(a), that the subcontractor will appropriately safeguard the 
information.
    (3) Implementation specifications: Written contract or other 
arrangement (Required). Document the satisfactory assurances required 
by paragraph (b)(1) or (b)(2) of this section through a written 
contract or other arrangement with the business associate that meets 
the applicable requirements of Sec.  164.314(a).

0
35. Revise the introductory text of Sec.  164.310 to read as follows:


Sec.  164.310  Physical safeguards.

    A covered entity or business associate must, in accordance with 
Sec.  164.306:
* * * * *

0
36. Revise the introductory text of Sec.  164.312 to read as follows:


Sec.  164.312  Technical safeguards.

    A covered entity or business associate must, in accordance with 
Sec.  164.306:
* * * * *

0
37. Amend Sec.  164.314 by revising paragraphs (a) and (b)(2)(iii) to 
read as follows:


Sec.  164.314  Organizational requirements.

    (a)(1) Standard: Business associate contracts or other 
arrangements. The contract or other arrangement required by Sec.  
164.308(b)(4) must meet the requirements of paragraph (a)(2)(i), 
(a)(2)(ii), or (a)(2)(iii) of this section, as applicable.
    (2) Implementation specifications (Required).
    (i) Business associate contracts. The contract must provide that 
the business associate will--
    (A) Comply with the applicable requirements of this subpart;
    (B) In accordance with Sec.  164.308(b)(2), ensure that any 
subcontractors that create, receive, maintain, or transmit electronic 
protected health information on behalf of the business associate agree 
to comply with the applicable requirements of this subpart by entering 
into a contract or other arrangement that complies with this section; 
and
    (C) Report to the covered entity any security incident of which it 
becomes aware, including breaches of unsecured protected health 
information as required by Sec.  164.410.
    (ii) Other arrangements. The covered entity is in compliance with 
paragraph (a)(1) of this section if it has another arrangement in place 
that meets the requirements of Sec.  164.504(e)(3).
    (iii) Business associate contracts with subcontractors. The 
requirements of paragraphs (a)(2)(i) and (a)(2)(ii) of this section 
apply to the contract or other arrangement between a business associate 
and a subcontractor required by Sec.  164.308(b)(4) in the same manner 
as such requirements apply to contracts or other arrangements between a 
covered entity and business associate.
    (b) * * *
    (2) * * *
    (iii) Ensure that any agent to whom it provides this information 
agrees to implement reasonable and appropriate security measures to 
protect the information; and
* * * * *

[[Page 5695]]


0
38. Revise the introductory text of Sec.  164.316 and the third 
sentence of paragraph (a) to read as follows:


Sec.  164.316  Policies and procedures and documentation requirements.

    A covered entity or business associate must, in accordance with 
Sec.  164.306:
    (a) * * * A covered entity or business associate may change its 
policies and procedures at any time, provided that the changes are 
documented and are implemented in accordance with this subpart.
* * * * *

0
39. Revise Sec.  164.402 to read as follows:


Sec.  164.402  Definitions.

    As used in this subpart, the following terms have the following 
meanings:
    Breach means the acquisition, access, use, or disclosure of 
protected health information in a manner not permitted under subpart E 
of this part which compromises the security or privacy of the protected 
health information.
    (1) Breach excludes:
    (i) Any unintentional acquisition, access, or use of protected 
health information by a workforce member or person acting under the 
authority of a covered entity or a business associate, if such 
acquisition, access, or use was made in good faith and within the scope 
of authority and does not result in further use or disclosure in a 
manner not permitted under subpart E of this part.
    (ii) Any inadvertent disclosure by a person who is authorized to 
access protected health information at a covered entity or business 
associate to another person authorized to access protected health 
information at the same covered entity or business associate, or 
organized health care arrangement in which the covered entity 
participates, and the information received as a result of such 
disclosure is not further used or disclosed in a manner not permitted 
under subpart E of this part.
    (iii) A disclosure of protected health information where a covered 
entity or business associate has a good faith belief that an 
unauthorized person to whom the disclosure was made would not 
reasonably have been able to retain such information.
    (2) Except as provided in paragraph (1) of this definition, an 
acquisition, access, use, or disclosure of protected health information 
in a manner not permitted under subpart E is presumed to be a breach 
unless the covered entity or business associate, as applicable, 
demonstrates that there is a low probability that the protected health 
information has been compromised based on a risk assessment of at least 
the following factors:
    (i) The nature and extent of the protected health information 
involved, including the types of identifiers and the likelihood of re-
identification;
    (ii) The unauthorized person who used the protected health 
information or to whom the disclosure was made;
    (iii) Whether the protected health information was actually 
acquired or viewed; and
    (iv) The extent to which the risk to the protected health 
information has been mitigated.
    Unsecured protected health information means protected health 
information that is not rendered unusable, unreadable, or 
indecipherable to unauthorized persons through the use of a technology 
or methodology specified by the Secretary in the guidance issued under 
section 13402(h)(2) of Public Law 111-5.

0
40. In Sec.  164.406, revise paragraph (a) to read as follows:


Sec.  164.406  Notification to the media.

    (a) Standard. For a breach of unsecured protected health 
information involving more than 500 residents of a State or 
jurisdiction, a covered entity shall, following the discovery of the 
breach as provided in Sec.  164.404(a)(2), notify prominent media 
outlets serving the State or jurisdiction.
* * * * *

0
41. In Sec.  164.408, revise paragraph (c) to read as follows:


Sec.  164.408  Notification to the Secretary.

* * * * *
    (c) Implementation specifications: Breaches involving less than 500 
individuals. For breaches of unsecured protected health information 
involving less than 500 individuals, a covered entity shall maintain a 
log or other documentation of such breaches and, not later than 60 days 
after the end of each calendar year, provide the notification required 
by paragraph (a) of this section for breaches discovered during the 
preceding calendar year, in the manner specified on the HHS web site.

0
42. In Sec.  164.410, revise paragraph (a) to read as follows:


Sec.  164.410  Notification by a business associate.

    (a) Standard--(1) General rule. A business associate shall, 
following the discovery of a breach of unsecured protected health 
information, notify the covered entity of such breach.
    (2) Breaches treated as discovered. For purposes of paragraph 
(a)(1) of this section, a breach shall be treated as discovered by a 
business associate as of the first day on which such breach is known to 
the business associate or, by exercising reasonable diligence, would 
have been known to the business associate. A business associate shall 
be deemed to have knowledge of a breach if the breach is known, or by 
exercising reasonable diligence would have been known, to any person, 
other than the person committing the breach, who is an employee, 
officer, or other agent of the business associate (determined in 
accordance with the Federal common law of agency).
* * * * *

0
43. The authority citation for subpart E of part 164 is revised to read 
as follows:

    Authority: 42 U.S.C. 1320d-2, 1320d-4, and 1320d-9; sec. 264 of 
Pub. L. 104-191, 110 Stat. 2033-2034 (42 U.S.C. 1320d-2 (note)); and 
secs. 13400-13424, Pub. L. 111-5, 123 Stat. 258-279.


0
44. In Sec.  164.500, redesignate paragraph (c) as paragraph (d) and 
add new paragraph (c) to read as follows:


Sec.  164.500  Applicability.

* * * * *
    (c) Where provided, the standards, requirements, and implementation 
specifications adopted under this subpart apply to a business associate 
with respect to the protected health information of a covered entity.
* * * * *

0
45. Amend Sec.  164.501 as follows:
0
a. Revise paragraphs (1) and (3) of the definition of ``Health care 
operations'';
0
b. Revise the definition of ``Marketing''; and
0
c. Revise paragraph (1)(i) of the definition of ``Payment''.
    The revisions read as follows:


Sec.  164.501  Definitions.

* * * * *
    Health care operations means * * *
    (1) Conducting quality assessment and improvement activities, 
including outcomes evaluation and development of clinical guidelines, 
provided that the obtaining of generalizable knowledge is not the 
primary purpose of any studies resulting from such activities; patient 
safety activities (as defined in 42 CFR 3.20); population-based 
activities relating to improving health or reducing health care costs, 
protocol development, case management and care coordination, contacting 
of health care providers and patients with information about treatment 
alternatives; and related functions that do not include treatment;
* * * * *
    (3) Except as prohibited under Sec.  164.502(a)(5)(i), 
underwriting,

[[Page 5696]]

enrollment, premium rating, and other activities related to the 
creation, renewal, or replacement of a contract of health insurance or 
health benefits, and ceding, securing, or placing a contract for 
reinsurance of risk relating to claims for health care (including stop-
loss insurance and excess of loss insurance), provided that the 
requirements of Sec.  164.514(g) are met, if applicable;
* * * * *
    Marketing: (1) Except as provided in paragraph (2) of this 
definition, marketing means to make a communication about a product or 
service that encourages recipients of the communication to purchase or 
use the product or service.
    (2) Marketing does not include a communication made:
    (i) To provide refill reminders or otherwise communicate about a 
drug or biologic that is currently being prescribed for the individual, 
only if any financial remuneration received by the covered entity in 
exchange for making the communication is reasonably related to the 
covered entity's cost of making the communication.
    (ii) For the following treatment and health care operations 
purposes, except where the covered entity receives financial 
remuneration in exchange for making the communication:
    (A) For treatment of an individual by a health care provider, 
including case management or care coordination for the individual, or 
to direct or recommend alternative treatments, therapies, health care 
providers, or settings of care to the individual;
    (B) To describe a health-related product or service (or payment for 
such product or service) that is provided by, or included in a plan of 
benefits of, the covered entity making the communication, including 
communications about: the entities participating in a health care 
provider network or health plan network; replacement of, or 
enhancements to, a health plan; and health-related products or services 
available only to a health plan enrollee that add value to, but are not 
part of, a plan of benefits; or
    (C) For case management or care coordination, contacting of 
individuals with information about treatment alternatives, and related 
functions to the extent these activities do not fall within the 
definition of treatment.
    (3) Financial remuneration means direct or indirect payment from or 
on behalf of a third party whose product or service is being described. 
Direct or indirect payment does not include any payment for treatment 
of an individual.
    Payment means:
    (1) * * *
    (i) Except as prohibited under Sec.  164.502(a)(5)(i), a health 
plan to obtain premiums or to determine or fulfill its responsibility 
for coverage and provision of benefits under the health plan; or
* * * * *

0
46. In Sec.  164.502, revise paragraphs (a), (b)(1), (e), and (f) to 
read as follows:


Sec.  164.502  Uses and disclosures of protected health information: 
General rules.

    (a) Standard. A covered entity or business associate may not use or 
disclose protected health information, except as permitted or required 
by this subpart or by subpart C of part 160 of this subchapter.
    (1) Covered entities: Permitted uses and disclosures. A covered 
entity is permitted to use or disclose protected health information as 
follows:
    (i) To the individual;
    (ii) For treatment, payment, or health care operations, as 
permitted by and in compliance with Sec.  164.506;
    (iii) Incident to a use or disclosure otherwise permitted or 
required by this subpart, provided that the covered entity has complied 
with the applicable requirements of Sec. Sec.  164.502(b), 164.514(d), 
and 164.530(c) with respect to such otherwise permitted or required use 
or disclosure;
    (iv) Except for uses and disclosures prohibited under Sec.  
164.502(a)(5)(i), pursuant to and in compliance with a valid 
authorization under Sec.  164.508;
    (v) Pursuant to an agreement under, or as otherwise permitted by, 
Sec.  164.510; and
    (vi) As permitted by and in compliance with this section, Sec.  
164.512, Sec.  164.514(e), (f), or (g).
    (2) Covered entities: Required disclosures. A covered entity is 
required to disclose protected health information:
    (i) To an individual, when requested under, and required by Sec.  
164.524 or Sec.  164.528; and
    (ii) When required by the Secretary under subpart C of part 160 of 
this subchapter to investigate or determine the covered entity's 
compliance with this subchapter.
    (3) Business associates: Permitted uses and disclosures. A business 
associate may use or disclose protected health information only as 
permitted or required by its business associate contract or other 
arrangement pursuant to Sec.  164.504(e) or as required by law. The 
business associate may not use or disclose protected health information 
in a manner that would violate the requirements of this subpart, if 
done by the covered entity, except for the purposes specified under 
Sec.  164.504(e)(2)(i)(A) or (B) if such uses or disclosures are 
permitted by its contract or other arrangement.
    (4) Business associates: Required uses and disclosures. A business 
associate is required to disclose protected health information:
    (i) When required by the Secretary under subpart C of part 160 of 
this subchapter to investigate or determine the business associate's 
compliance with this subchapter.
    (ii) To the covered entity, individual, or individual's designee, 
as necessary to satisfy a covered entity's obligations under Sec.  
164.524(c)(2)(ii) and (3)(ii) with respect to an individual's request 
for an electronic copy of protected health information.
    (5) Prohibited uses and disclosures.
    (i) Use and disclosure of genetic information for underwriting 
purposes: Notwithstanding any other provision of this subpart, a health 
plan, excluding an issuer of a long-term care policy falling within 
paragraph (1)(viii) of the definition of health plan, shall not use or 
disclose protected health information that is genetic information for 
underwriting purposes. For purposes of paragraph (a)(5)(i) of this 
section, underwriting purposes means, with respect to a health plan:
    (A) Except as provided in paragraph (a)(5)(i)(B) of this section:
    (1) Rules for, or determination of, eligibility (including 
enrollment and continued eligibility) for, or determination of, 
benefits under the plan, coverage, or policy (including changes in 
deductibles or other cost-sharing mechanisms in return for activities 
such as completing a health risk assessment or participating in a 
wellness program);
    (2) The computation of premium or contribution amounts under the 
plan, coverage, or policy (including discounts, rebates, payments in 
kind, or other premium differential mechanisms in return for activities 
such as completing a health risk assessment or participating in a 
wellness program);
    (3) The application of any pre-existing condition exclusion under 
the plan, coverage, or policy; and
    (4) Other activities related to the creation, renewal, or 
replacement of a contract of health insurance or health benefits.
    (B) Underwriting purposes does not include determinations of 
medical appropriateness where an individual seeks a benefit under the 
plan, coverage, or policy.
    (ii) Sale of protected health information:

[[Page 5697]]

    (A) Except pursuant to and in compliance with Sec.  164.508(a)(4), 
a covered entity or business associate may not sell protected health 
information.
    (B) For purposes of this paragraph, sale of protected health 
information means:
    (1) Except as provided in paragraph (a)(5)(ii)(B)(2) of this 
section, a disclosure of protected health information by a covered 
entity or business associate, if applicable, where the covered entity 
or business associate directly or indirectly receives remuneration from 
or on behalf of the recipient of the protected health information in 
exchange for the protected health information.
    (2) Sale of protected health information does not include a 
disclosure of protected health information:
    (i) For public health purposes pursuant to Sec.  164.512(b) or 
Sec.  164.514(e);
    (ii) For research purposes pursuant to Sec.  164.512(i) or Sec.  
164.514(e), where the only remuneration received by the covered entity 
or business associate is a reasonable cost-based fee to cover the cost 
to prepare and transmit the protected health information for such 
purposes;
    (iii) For treatment and payment purposes pursuant to Sec.  
164.506(a);
    (iv) For the sale, transfer, merger, or consolidation of all or 
part of the covered entity and for related due diligence as described 
in paragraph (6)(iv) of the definition of health care operations and 
pursuant to Sec.  164.506(a);
    (v) To or by a business associate for activities that the business 
associate undertakes on behalf of a covered entity, or on behalf of a 
business associate in the case of a subcontractor, pursuant to 
Sec. Sec.  164.502(e) and 164.504(e), and the only remuneration 
provided is by the covered entity to the business associate, or by the 
business associate to the subcontractor, if applicable, for the 
performance of such activities;
    (vi) To an individual, when requested under Sec.  164.524 or Sec.  
164.528;
    (vii) Required by law as permitted under Sec.  164.512(a); and
    (viii) For any other purpose permitted by and in accordance with 
the applicable requirements of this subpart, where the only 
remuneration received by the covered entity or business associate is a 
reasonable, cost-based fee to cover the cost to prepare and transmit 
the protected health information for such purpose or a fee otherwise 
expressly permitted by other law.
    (b) * * *
    (1) Minimum necessary applies. When using or disclosing protected 
health information or when requesting protected health information from 
another covered entity or business associate, a covered entity or 
business associate must make reasonable efforts to limit protected 
health information to the minimum necessary to accomplish the intended 
purpose of the use, disclosure, or request.
* * * * *
    (e)(1) Standard: Disclosures to business associates. (i) A covered 
entity may disclose protected health information to a business 
associate and may allow a business associate to create, receive, 
maintain, or transmit protected health information on its behalf, if 
the covered entity obtains satisfactory assurance that the business 
associate will appropriately safeguard the information. A covered 
entity is not required to obtain such satisfactory assurances from a 
business associate that is a subcontractor.
    (ii) A business associate may disclose protected health information 
to a business associate that is a subcontractor and may allow the 
subcontractor to create, receive, maintain, or transmit protected 
health information on its behalf, if the business associate obtains 
satisfactory assurances, in accordance with Sec.  164.504(e)(1)(i), 
that the subcontractor will appropriately safeguard the information.
    (2) Implementation specification: Documentation. The satisfactory 
assurances required by paragraph (e)(1) of this section must be 
documented through a written contract or other written agreement or 
arrangement with the business associate that meets the applicable 
requirements of Sec.  164.504(e).
    (f) Standard: Deceased individuals. A covered entity must comply 
with the requirements of this subpart with respect to the protected 
health information of a deceased individual for a period of 50 years 
following the death of the individual.
* * * * *

0
47. In Sec.  164.504, revise paragraphs (e), (f)(1)(ii) introductory 
text, and (f)(2)(ii)(B) to read as follows:


Sec.  164.504  Uses and disclosures: Organizational requirements.

* * * * *
    (e)(1) Standard: Business associate contracts. (i) The contract or 
other arrangement required by Sec.  164.502(e)(2) must meet the 
requirements of paragraph (e)(2), (e)(3), or (e)(5) of this section, as 
applicable.
    (ii) A covered entity is not in compliance with the standards in 
Sec.  164.502(e) and this paragraph, if the covered entity knew of a 
pattern of activity or practice of the business associate that 
constituted a material breach or violation of the business associate's 
obligation under the contract or other arrangement, unless the covered 
entity took reasonable steps to cure the breach or end the violation, 
as applicable, and, if such steps were unsuccessful, terminated the 
contract or arrangement, if feasible.
    (iii) A business associate is not in compliance with the standards 
in Sec.  164.502(e) and this paragraph, if the business associate knew 
of a pattern of activity or practice of a subcontractor that 
constituted a material breach or violation of the subcontractor's 
obligation under the contract or other arrangement, unless the business 
associate took reasonable steps to cure the breach or end the 
violation, as applicable, and, if such steps were unsuccessful, 
terminated the contract or arrangement, if feasible.
    (2) Implementation specifications: Business associate contracts. A 
contract between the covered entity and a business associate must:
    (i) Establish the permitted and required uses and disclosures of 
protected health information by the business associate. The contract 
may not authorize the business associate to use or further disclose the 
information in a manner that would violate the requirements of this 
subpart, if done by the covered entity, except that:
    (A) The contract may permit the business associate to use and 
disclose protected health information for the proper management and 
administration of the business associate, as provided in paragraph 
(e)(4) of this section; and
    (B) The contract may permit the business associate to provide data 
aggregation services relating to the health care operations of the 
covered entity.
    (ii) Provide that the business associate will:
    (A) Not use or further disclose the information other than as 
permitted or required by the contract or as required by law;
    (B) Use appropriate safeguards and comply, where applicable, with 
subpart C of this part with respect to electronic protected health 
information, to prevent use or disclosure of the information other than 
as provided for by its contract;
    (C) Report to the covered entity any use or disclosure of the 
information not provided for by its contract of which it becomes aware, 
including breaches of unsecured protected health information as 
required by Sec.  164.410;
    (D) In accordance with Sec.  164.502(e)(1)(ii), ensure that any

[[Page 5698]]

subcontractors that create, receive, maintain, or transmit protected 
health information on behalf of the business associate agree to the 
same restrictions and conditions that apply to the business associate 
with respect to such information;
    (E) Make available protected health information in accordance with 
Sec.  164.524;
    (F) Make available protected health information for amendment and 
incorporate any amendments to protected health information in 
accordance with Sec.  164.526;
    (G) Make available the information required to provide an 
accounting of disclosures in accordance with Sec.  164.528;
    (H) To the extent the business associate is to carry out a covered 
entity's obligation under this subpart, comply with the requirements of 
this subpart that apply to the covered entity in the performance of 
such obligation.
    (I) Make its internal practices, books, and records relating to the 
use and disclosure of protected health information received from, or 
created or received by the business associate on behalf of, the covered 
entity available to the Secretary for purposes of determining the 
covered entity's compliance with this subpart; and
    (J) At termination of the contract, if feasible, return or destroy 
all protected health information received from, or created or received 
by the business associate on behalf of, the covered entity that the 
business associate still maintains in any form and retain no copies of 
such information or, if such return or destruction is not feasible, 
extend the protections of the contract to the information and limit 
further uses and disclosures to those purposes that make the return or 
destruction of the information infeasible.
    (iii) Authorize termination of the contract by the covered entity, 
if the covered entity determines that the business associate has 
violated a material term of the contract.
    (3) Implementation specifications: Other arrangements. (i) If a 
covered entity and its business associate are both governmental 
entities:
    (A) The covered entity may comply with this paragraph and Sec.  
164.314(a)(1), if applicable, by entering into a memorandum of 
understanding with the business associate that contains terms that 
accomplish the objectives of paragraph (e)(2) of this section and Sec.  
164.314(a)(2), if applicable.
    (B) The covered entity may comply with this paragraph and Sec.  
164.314(a)(1), if applicable, if other law (including regulations 
adopted by the covered entity or its business associate) contains 
requirements applicable to the business associate that accomplish the 
objectives of paragraph (e)(2) of this section and Sec.  164.314(a)(2), 
if applicable.
    (ii) If a business associate is required by law to perform a 
function or activity on behalf of a covered entity or to provide a 
service described in the definition of business associate in Sec.  
160.103 of this subchapter to a covered entity, such covered entity may 
disclose protected health information to the business associate to the 
extent necessary to comply with the legal mandate without meeting the 
requirements of this paragraph and Sec.  164.314(a)(1), if applicable, 
provided that the covered entity attempts in good faith to obtain 
satisfactory assurances as required by paragraph (e)(2) of this section 
and Sec.  164.314(a)(1), if applicable, and, if such attempt fails, 
documents the attempt and the reasons that such assurances cannot be 
obtained.
    (iii) The covered entity may omit from its other arrangements the 
termination authorization required by paragraph (e)(2)(iii) of this 
section, if such authorization is inconsistent with the statutory 
obligations of the covered entity or its business associate.
    (iv) A covered entity may comply with this paragraph and Sec.  
164.314(a)(1) if the covered entity discloses only a limited data set 
to a business associate for the business associate to carry out a 
health care operations function and the covered entity has a data use 
agreement with the business associate that complies with Sec.  
164.514(e)(4) and Sec.  164.314(a)(1), if applicable.
    (4) Implementation specifications: Other requirements for contracts 
and other arrangements. (i) The contract or other arrangement between 
the covered entity and the business associate may permit the business 
associate to use the protected health information received by the 
business associate in its capacity as a business associate to the 
covered entity, if necessary:
    (A) For the proper management and administration of the business 
associate; or
    (B) To carry out the legal responsibilities of the business 
associate.
    (ii) The contract or other arrangement between the covered entity 
and the business associate may permit the business associate to 
disclose the protected health information received by the business 
associate in its capacity as a business associate for the purposes 
described in paragraph (e)(4)(i) of this section, if:
    (A) The disclosure is required by law; or
    (B)(1) The business associate obtains reasonable assurances from 
the person to whom the information is disclosed that it will be held 
confidentially and used or further disclosed only as required by law or 
for the purposes for which it was disclosed to the person; and
    (2) The person notifies the business associate of any instances of 
which it is aware in which the confidentiality of the information has 
been breached.
    (5) Implementation specifications: Business associate contracts 
with subcontractors. The requirements of Sec.  164.504(e)(2) through 
(e)(4) apply to the contract or other arrangement required by Sec.  
164.502(e)(1)(ii) between a business associate and a business associate 
that is a subcontractor in the same manner as such requirements apply 
to contracts or other arrangements between a covered entity and 
business associate.
    (f)(1)* * *
    (ii) Except as prohibited by Sec.  164.502(a)(5)(i), the group 
health plan, or a health insurance issuer or HMO with respect to the 
group health plan, may disclose summary health information to the plan 
sponsor, if the plan sponsor requests the summary health information 
for purposes of:
* * * * *
    (2) * * *
    (ii) * * *
    (B) Ensure that any agents to whom it provides protected health 
information received from the group health plan agree to the same 
restrictions and conditions that apply to the plan sponsor with respect 
to such information;
* * * * *

0
48. In Sec.  164.506, revise paragraphs (a) and (c)(5) to read as 
follows:


Sec.  164.506  Uses and disclosures to carry out treatment, payment, or 
health care operations.

    (a) Standard: Permitted uses and disclosures. Except with respect 
to uses or disclosures that require an authorization under Sec.  
164.508(a)(2) through (4) or that are prohibited under Sec.  
164.502(a)(5)(i), a covered entity may use or disclose protected health 
information for treatment, payment, or health care operations as set 
forth in paragraph (c) of this section, provided that such use or 
disclosure is consistent with other applicable requirements of this 
subpart.
* * * * *
    (c) * * *
    (5) A covered entity that participates in an organized health care 
arrangement

[[Page 5699]]

may disclose protected health information about an individual to other 
participants in the organized health care arrangement for any health 
care operations activities of the organized health care arrangement.

0
49. Amend Sec.  164.508 as follows:
0
a. Revise the headings of paragraphs (a), (a)(1), and (a)(2);
0
b. Revise paragraph (a)(3)(ii);
0
c. Add new paragraph (a)(4); and
0
d. Revise paragraphs (b)(1)(i), and (b)(3).
    The revisions and additions read as follows:


Sec.  164.508  Uses and disclosures for which an authorization is 
required.

    (a) Standard: Authorizations for uses and disclosures--(1) 
Authorization required: General rule. * * *
    (2) Authorization required: Psychotherapy notes. * * *
    (3) * * *
    (ii) If the marketing involves financial remuneration, as defined 
in paragraph (3) of the definition of marketing at Sec.  164.501, to 
the covered entity from a third party, the authorization must state 
that such remuneration is involved.
    (4) Authorization required: Sale of protected health information.
    (i) Notwithstanding any provision of this subpart, other than the 
transition provisions in Sec.  164.532, a covered entity must obtain an 
authorization for any disclosure of protected health information which 
is a sale of protected health information, as defined in Sec.  164.501 
of this subpart. (ii) Such authorization must state that the disclosure 
will result in remuneration to the covered entity.
    (b) * * *
    (1) * * *
    (i) A valid authorization is a document that meets the requirements 
in paragraphs (a)(3)(ii), (a)(4)(ii), (c)(1), and (c)(2) of this 
section, as applicable.
* * * * *
    (3) Compound authorizations. An authorization for use or disclosure 
of protected health information may not be combined with any other 
document to create a compound authorization, except as follows:
    (i) An authorization for the use or disclosure of protected health 
information for a research study may be combined with any other type of 
written permission for the same or another research study. This 
exception includes combining an authorization for the use or disclosure 
of protected health information for a research study with another 
authorization for the same research study, with an authorization for 
the creation or maintenance of a research database or repository, or 
with a consent to participate in research. Where a covered health care 
provider has conditioned the provision of research-related treatment on 
the provision of one of the authorizations, as permitted under 
paragraph (b)(4)(i) of this section, any compound authorization created 
under this paragraph must clearly differentiate between the conditioned 
and unconditioned components and provide the individual with an 
opportunity to opt in to the research activities described in the 
unconditioned authorization.
    (ii) An authorization for a use or disclosure of psychotherapy 
notes may only be combined with another authorization for a use or 
disclosure of psychotherapy notes.
    (iii) An authorization under this section, other than an 
authorization for a use or disclosure of psychotherapy notes, may be 
combined with any other such authorization under this section, except 
when a covered entity has conditioned the provision of treatment, 
payment, enrollment in the health plan, or eligibility for benefits 
under paragraph (b)(4) of this section on the provision of one of the 
authorizations. The prohibition in this paragraph on combining 
authorizations where one authorization conditions the provision of 
treatment, payment, enrollment in a health plan, or eligibility for 
benefits under paragraph (b)(4) of this section does not apply to a 
compound authorization created in accordance with paragraph (b)(3)(i) 
of this section.
* * * * *

0
50. Amend Sec.  164.510 as follows:
0
a. Revise paragraph (a)(1)(ii) introductory text;
0
b. Revise paragraph (b)(1)(i), the second sentence of paragraph 
(b)(1)(ii), paragraph (b)(2)(iii), the first sentence of paragraph 
(b)(3), and paragraph (b)(4); and
0
c. Add new paragraph (b)(5).
    The revisions and additions read as follows:


Sec.  164.510  Uses and disclosures requiring an opportunity for the 
individual to agree or to object.

* * * * *
    (a) * * *
    (1) * * *
    (ii) Use or disclose for directory purposes such information:
* * * * *
    (b) * * *
    (1) * * *
    (i) A covered entity may, in accordance with paragraphs (b)(2), 
(b)(3), or (b)(5) of this section, disclose to a family member, other 
relative, or a close personal friend of the individual, or any other 
person identified by the individual, the protected health information 
directly relevant to such person's involvement with the individual's 
health care or payment related to the individual's health care.
    (ii) * * * Any such use or disclosure of protected health 
information for such notification purposes must be in accordance with 
paragraphs (b)(2), (b)(3), (b)(4), or (b)(5) of this section, as 
applicable.
* * * * *
    (2) * * *
    (iii) Reasonably infers from the circumstances, based on the 
exercise of professional judgment, that the individual does not object 
to the disclosure.
    (3) * * * If the individual is not present, or the opportunity to 
agree or object to the use or disclosure cannot practicably be provided 
because of the individual's incapacity or an emergency circumstance, 
the covered entity may, in the exercise of professional judgment, 
determine whether the disclosure is in the best interests of the 
individual and, if so, disclose only the protected health information 
that is directly relevant to the person's involvement with the 
individual's care or payment related to the individual's health care or 
needed for notification purposes. * * *
    (4) Uses and disclosures for disaster relief purposes. A covered 
entity may use or disclose protected health information to a public or 
private entity authorized by law or by its charter to assist in 
disaster relief efforts, for the purpose of coordinating with such 
entities the uses or disclosures permitted by paragraph (b)(1)(ii) of 
this section. The requirements in paragraphs (b)(2), (b)(3), or (b)(5) 
of this section apply to such uses and disclosures to the extent that 
the covered entity, in the exercise of professional judgment, 
determines that the requirements do not interfere with the ability to 
respond to the emergency circumstances.
    (5) Uses and disclosures when the individual is deceased. If the 
individual is deceased, a covered entity may disclose to a family 
member, or other persons identified in paragraph (b)(1) of this section 
who were involved in the individual's care or payment for health care 
prior to the individual's death, protected health information of the 
individual that is relevant to such person's involvement, unless doing 
so is inconsistent with any prior expressed preference of the 
individual that is known to the covered entity.

0
51. Amend Sec.  164.512 as follows:
0
a. Revise the paragraph heading for paragraph (b), the introductory 
text of

[[Page 5700]]

paragraph (b)(1) and the introductory text of paragraph (b)(1)(v)(A);
0
b. Add new paragraph (b)(1)(vi);
0
c. Revise the introductory text of paragraph (e)(1)(iii) and paragraph 
(e)(1)(vi);
0
d. Revise paragraph (i)(2)(iii); and
0
e. Revise paragraphs (k)(1)(ii), (k)(3), and (k)(5)(i)(E).
    The revisions and additions read as follows:


Sec.  164.512  Uses and disclosures for which an authorization or 
opportunity to agree or object is not required.

* * * * *
    (b) Standard: Uses and disclosures for public health activities. 
(1) Permitted uses and disclosures. A covered entity may use or 
disclose protected health information for the public health activities 
and purposes described in this paragraph to:
* * * * *
    (v) * * *
    (A) The covered entity is a covered health care provider who 
provides health care to the individual at the request of the employer:
* * * * *
    (vi) A school, about an individual who is a student or prospective 
student of the school, if:
    (A) The protected health information that is disclosed is limited 
to proof of immunization;
    (B) The school is required by State or other law to have such proof 
of immunization prior to admitting the individual; and
    (C) The covered entity obtains and documents the agreement to the 
disclosure from either:
    (1) A parent, guardian, or other person acting in loco parentis of 
the individual, if the individual is an unemancipated minor; or
    (2) The individual, if the individual is an adult or emancipated 
minor.
* * * * *
    (e) * * *
    (1) * * *
    (iii) For the purposes of paragraph (e)(1)(ii)(A) of this section, 
a covered entity receives satisfactory assurances from a party seeking 
protected health information if the covered entity receives from such 
party a written statement and accompanying documentation demonstrating 
that:
* * * * *
    (vi) Notwithstanding paragraph (e)(1)(ii) of this section, a 
covered entity may disclose protected health information in response to 
lawful process described in paragraph (e)(1)(ii) of this section 
without receiving satisfactory assurance under paragraph (e)(1)(ii)(A) 
or (B) of this section, if the covered entity makes reasonable efforts 
to provide notice to the individual sufficient to meet the requirements 
of paragraph (e)(1)(iii) of this section or to seek a qualified 
protective order sufficient to meet the requirements of paragraph 
(e)(1)(v) of this section.
* * * * *
    (i) * * *
    (2) * * *
    (iii) Protected health information needed. A brief description of 
the protected health information for which use or access has been 
determined to be necessary by the institutional review board or privacy 
board, pursuant to paragraph (i)(2)(ii)(C) of this section;
* * * * *
    (k) * * *
    (1) * * *
    (ii) Separation or discharge from military service. A covered 
entity that is a component of the Departments of Defense or Homeland 
Security may disclose to the Department of Veterans Affairs (DVA) the 
protected health information of an individual who is a member of the 
Armed Forces upon the separation or discharge of the individual from 
military service for the purpose of a determination by DVA of the 
individual's eligibility for or entitlement to benefits under laws 
administered by the Secretary of Veterans Affairs.
* * * * *
    (3) Protective services for the President and others. A covered 
entity may disclose protected health information to authorized Federal 
officials for the provision of protective services to the President or 
other persons authorized by 18 U.S.C. 3056 or to foreign heads of state 
or other persons authorized by 22 U.S.C. 2709(a)(3), or for the conduct 
of investigations authorized by 18 U.S.C. 871 and 879.
* * * * *
    (5) * * *
    (i) * * *
    (E) Law enforcement on the premises of the correctional 
institution; or
* * * * *

0
52. In Sec.  164.514, revise paragraphs (e)(4)(ii)(C)(4), (f), and (g) 
to read as follows:


Sec.  164.514  Other requirements relating to uses and disclosures of 
protected health information.

* * * * *
    (e) * * *
    (4) * * *
    (ii) * * *
    (C) * * *
    (4) Ensure that any agents to whom it provides the limited data set 
agree to the same restrictions and conditions that apply to the limited 
data set recipient with respect to such information; and
* * * * *
    (f) Fundraising communications.
    (1) Standard: Uses and disclosures for fundraising. Subject to the 
conditions of paragraph (f)(2) of this section, a covered entity may 
use, or disclose to a business associate or to an institutionally 
related foundation, the following protected health information for the 
purpose of raising funds for its own benefit, without an authorization 
meeting the requirements of Sec.  164.508:
    (i) Demographic information relating to an individual, including 
name, address, other contact information, age, gender, and date of 
birth;
    (ii) Dates of health care provided to an individual;
    (iii) Department of service information;
    (iv) Treating physician;
    (v) Outcome information; and
    (vi) Health insurance status.
    (2) Implementation specifications: Fundraising requirements. (i) A 
covered entity may not use or disclose protected health information for 
fundraising purposes as otherwise permitted by paragraph (f)(1) of this 
section unless a statement required by Sec.  164.520(b)(1)(iii)(A) is 
included in the covered entity's notice of privacy practices.
    (ii) With each fundraising communication made to an individual 
under this paragraph, a covered entity must provide the individual with 
a clear and conspicuous opportunity to elect not to receive any further 
fundraising communications. The method for an individual to elect not 
to receive further fundraising communications may not cause the 
individual to incur an undue burden or more than a nominal cost.
    (iii) A covered entity may not condition treatment or payment on 
the individual's choice with respect to the receipt of fundraising 
communications.
    (iv) A covered entity may not make fundraising communications to an 
individual under this paragraph where the individual has elected not to 
receive such communications under paragraph (f)(1)(ii)(B) of this 
section.
    (v) A covered entity may provide an individual who has elected not 
to receive further fundraising communications with a method to opt back 
in to receive such communications.
    (g) Standard: uses and disclosures for underwriting and related 
purposes. If a health plan receives protected health information for 
the purpose of underwriting, premium rating, or other activities 
relating to the creation,

[[Page 5701]]

renewal, or replacement of a contract of health insurance or health 
benefits, and if such health insurance or health benefits are not 
placed with the health plan, such health plan may only use or disclose 
such protected health information for such purpose or as may be 
required by law, subject to the prohibition at Sec.  164.502(a)(5)(i) 
with respect to genetic information included in the protected health 
information.
* * * * *

0
53. Amend Sec.  164.520:
0
a. Revise paragraphs (b)(1)(ii)(E), (b)(1)(iii), (b)(1)(iv)(A), 
(b)(1)(v)(A), (c)(1)(i) introductory text, and (c)(1)(i)(B);
0
b. Remove paragraph (c)(1)(i)(C); and
0
c. Add paragraph (c)(1)(v).
    The revisions and addition read as follows:


Sec.  164.520  Notice of privacy practices for protected health 
information.

* * * * *
    (b) * * *
    (1) * * *
    (ii) * * *
    (E) A description of the types of uses and disclosures that require 
an authorization under Sec.  164.508(a)(2)-(a)(4), a statement that 
other uses and disclosures not described in the notice will be made 
only with the individual's written authorization, and a statement that 
the individual may revoke an authorization as provided by Sec.  
164.508(b)(5).
    (iii) Separate statements for certain uses or disclosures. If the 
covered entity intends to engage in any of the following activities, 
the description required by paragraph (b)(1)(ii)(A) of this section 
must include a separate statement informing the individual of such 
activities, as applicable:
    (A) In accordance with Sec.  164.514(f)(1), the covered entity may 
contact the individual to raise funds for the covered entity and the 
individual has a right to opt out of receiving such communications; (B) 
In accordance with Sec.  164.504(f), the group health plan, or a health 
insurance issuer or HMO with respect to a group health plan, may 
disclose protected health information to the sponsor of the plan; or
    (C) If a covered entity that is a health plan, excluding an issuer 
of a long-term care policy falling within paragraph (1)(viii) of the 
definition of health plan, intends to use or disclose protected health 
information for underwriting purposes, a statement that the covered 
entity is prohibited from using or disclosing protected health 
information that is genetic information of an individual for such 
purposes.
    (iv) * * *
    (A) The right to request restrictions on certain uses and 
disclosures of protected health information as provided by Sec.  
164.522(a), including a statement that the covered entity is not 
required to agree to a requested restriction, except in case of a 
disclosure restricted under Sec.  164.522(a)(1)(vi);
* * * * *
    (v) * * *
    (A) A statement that the covered entity is required by law to 
maintain the privacy of protected health information, to provide 
individuals with notice of its legal duties and privacy practices with 
respect to protected health information, and to notify affected 
individuals following a breach of unsecured protected health 
information;
* * * * *
    (c) * * *
    (1) * * *
    (i) A health plan must provide the notice:
* * * * *
    (B) Thereafter, at the time of enrollment, to individuals who are 
new enrollees.
* * * * *
    (v) If there is a material change to the notice:
    (A) A health plan that posts its notice on its web site in 
accordance with paragraph (c)(3)(i) of this section must prominently 
post the change or its revised notice on its web site by the effective 
date of the material change to the notice, and provide the revised 
notice, or information about the material change and how to obtain the 
revised notice, in its next annual mailing to individuals then covered 
by the plan.
    (B) A health plan that does not post its notice on a web site 
pursuant to paragraph (c)(3)(i) of this section must provide the 
revised notice, or information about the material change and how to 
obtain the revised notice, to individuals then covered by the plan 
within 60 days of the material revision to the notice.
* * * * *

0
54. Amend Sec.  164.522 as follows:
0
a. Revise paragraph (a)(1)(ii);
0
b. Add new paragraph (a)(1)(vi); and
0
c. Revise the introductory text of paragraph (a)(2), and paragraphs 
(a)(2)(iii), and paragraph (a)(3).
    The revisions and additions read as follows:


Sec.  164.522  Rights to request privacy protection for protected 
health information.

    (a)(1) * * *
    (ii) Except as provided in paragraph (a)(1)(vi) of this section, a 
covered entity is not required to agree to a restriction.
* * * * *
    (vi) A covered entity must agree to the request of an individual to 
restrict disclosure of protected health information about the 
individual to a health plan if:
    (A) The disclosure is for the purpose of carrying out payment or 
health care operations and is not otherwise required by law; and
    (B) The protected health information pertains solely to a health 
care item or service for which the individual, or person other than the 
health plan on behalf of the individual, has paid the covered entity in 
full.
    (2) Implementation specifications: Terminating a restriction. A 
covered entity may terminate a restriction, if:
* * * * *
    (iii) The covered entity informs the individual that it is 
terminating its agreement to a restriction, except that such 
termination is:
    (A) Not effective for protected health information restricted under 
paragraph (a)(1)(vi) of this section; and
    (B) Only effective with respect to protected health information 
created or received after it has so informed the individual.
    (3) Implementation specification: Documentation. A covered entity 
must document a restriction in accordance with Sec.  160.530(j) of this 
subchapter.
* * * * *

0
55. Amend Sec.  164.524 as follows:
0
a. Remove paragraph (b)(2)(ii) and redesignate paragraph (b)(2)(iii) as 
paragraph (b)(2)(ii);
0
b. Revise newly designated paragraph (b)(2)(ii);
0
c. Revise paragraph (c)(2)(i);
0
d. Redesignate paragraph (c)(2)(ii) as paragraph (c)(2)(iii);
0
e. Add new paragraph (c)(2)(ii);
0
f. Revise paragraphs (c)(3) and (c)(4)(i);
0
g. Redesignate paragraphs (c)(4)(ii) and (c)(4)(iii) as paragraphs 
(c)(4)(iii) and (c)(4)(iv), respectively; and
0
h. Add new paragraph (c)(4)(ii).
    The revisions and additions read as follows:


Sec.  164.524  Access of individuals to protected health information.

* * * * *
    (b) * * *
    (2) * * *
    (ii) If the covered entity is unable to take an action required by 
paragraph (b)(2)(i)(A) or (B) of this section within the time required 
by paragraph (b)(2)(i) of this section, as applicable, the covered 
entity may extend the time for such actions by no more than 30 days, 
provided that:
    (A) The covered entity, within the time limit set by paragraph 
(b)(2)(i) of

[[Page 5702]]

this section, as applicable, provides the individual with a written 
statement of the reasons for the delay and the date by which the 
covered entity will complete its action on the request; and
    (B) The covered entity may have only one such extension of time for 
action on a request for access.
    (c) * * *
    (2) Form of access requested. (i) The covered entity must provide 
the individual with access to the protected health information in the 
form and format requested by the individual, if it is readily 
producible in such form and format; or, if not, in a readable hard copy 
form or such other form and format as agreed to by the covered entity 
and the individual.
    (ii) Notwithstanding paragraph (c)(2)(i) of this section, if the 
protected health information that is the subject of a request for 
access is maintained in one or more designated record sets 
electronically and if the individual requests an electronic copy of 
such information, the covered entity must provide the individual with 
access to the protected health information in the electronic form and 
format requested by the individual, if it is readily producible in such 
form and format; or, if not, in a readable electronic form and format 
as agreed to by the covered entity and the individual.
* * * * *
    (3) Time and manner of access. (i) The covered entity must provide 
the access as requested by the individual in a timely manner as 
required by paragraph (b)(2) of this section, including arranging with 
the individual for a convenient time and place to inspect or obtain a 
copy of the protected health information, or mailing the copy of the 
protected health information at the individual's request. The covered 
entity may discuss the scope, format, and other aspects of the request 
for access with the individual as necessary to facilitate the timely 
provision of access.
    (ii) If an individual's request for access directs the covered 
entity to transmit the copy of protected health information directly to 
another person designated by the individual, the covered entity must 
provide the copy to the person designated by the individual. The 
individual's request must be in writing, signed by the individual, and 
clearly identify the designated person and where to send the copy of 
protected health information.
    (4) * * *
    (i) Labor for copying the protected health information requested by 
the individual, whether in paper or electronic form;
    (ii) Supplies for creating the paper copy or electronic media if 
the individual requests that the electronic copy be provided on 
portable media;
* * * * *

0
56. In Sec.  164.532, revise paragraphs (a), (c)(2), (c)(3), (d), 
(e)(1), and (e)(2), and add paragraphs (c)(4) and (f) to read as 
follows:


Sec.  164.532  Transition provisions.

    (a) Standard: Effect of prior authorizations. Notwithstanding 
Sec. Sec.  164.508 and 164.512(i), a covered entity may use or disclose 
protected health information, consistent with paragraphs (b) and (c) of 
this section, pursuant to an authorization or other express legal 
permission obtained from an individual permitting the use or disclosure 
of protected health information, informed consent of the individual to 
participate in research, a waiver of informed consent by an IRB, or a 
waiver of authorization in accordance with Sec.  164.512(i)(1)(i).
* * * * *
    (c) * * *
    (2) The informed consent of the individual to participate in the 
research;
    (3) A waiver, by an IRB, of informed consent for the research, in 
accordance with 7 CFR 1c.116(d), 10 CFR 745.116(d), 14 CFR 1230.116(d), 
15 CFR 27.116(d), 16 CFR 1028.116(d), 21 CFR 50.24, 22 CFR 225.116(d), 
24 CFR 60.116(d), 28 CFR 46.116(d), 32 CFR 219.116(d), 34 CFR 
97.116(d), 38 CFR 16.116(d), 40 CFR 26.116(d), 45 CFR 46.116(d), 45 CFR 
690.116(d), or 49 CFR 11.116(d), provided that a covered entity must 
obtain authorization in accordance with Sec.  164.508 if, after the 
compliance date, informed consent is sought from an individual 
participating in the research; or
    (4) A waiver of authorization in accordance with Sec.  
164.512(i)(1)(i).
    (d) Standard: Effect of prior contracts or other arrangements with 
business associates. Notwithstanding any other provisions of this part, 
a covered entity, or business associate with respect to a 
subcontractor, may disclose protected health information to a business 
associate and may allow a business associate to create, receive, 
maintain, or transmit protected health information on its behalf 
pursuant to a written contract or other written arrangement with such 
business associate that does not comply with Sec. Sec.  164.308(b), 
164.314(a), 164.502(e), and 164.504(e), only in accordance with 
paragraph (e) of this section.
    (e) Implementation specification: Deemed compliance. (1) 
Qualification. Notwithstanding other sections of this part, a covered 
entity, or business associate with respect to a subcontractor, is 
deemed to be in compliance with the documentation and contract 
requirements of Sec. Sec.  164.308(b), 164.314(a), 164.502(e), and 
164.504(e), with respect to a particular business associate 
relationship, for the time period set forth in paragraph (e)(2) of this 
section, if:
    (i) Prior to January 25, 2013, such covered entity, or business 
associate with respect to a subcontractor, has entered into and is 
operating pursuant to a written contract or other written arrangement 
with the business associate that complies with the applicable 
provisions of Sec. Sec.  164.314(a) or 164.504(e) that were in effect 
on such date; and
    (ii) The contract or other arrangement is not renewed or modified 
from March 26, 2013, until September 23, 2013.
    (2) Limited deemed compliance period. A prior contract or other 
arrangement that meets the qualification requirements in paragraph (e) 
of this section shall be deemed compliant until the earlier of:
    (i) The date such contract or other arrangement is renewed or 
modified on or after September 23, 2013; or
    (ii) September 22, 2014.
* * * * *
    (f) Effect of prior data use agreements. If, prior to [January 25, 
2013, a covered entity has entered into and is operating pursuant to a 
data use agreement with a recipient of a limited data set that complies 
with Sec.  164.514(e), notwithstanding Sec.  164.502(a)(5)(ii), the 
covered entity may continue to disclose a limited data set pursuant to 
such agreement in exchange for remuneration from or on behalf of the 
recipient of the protected health information until the earlier of:
    (1) The date such agreement is renewed or modified on or after 
September 23, 2013; or
    (2) September 22, 2014.
* * * * *

    Dated: January 15, 2013.
Kathleen Sebelius,
Secretary.
[FR Doc. 2013-01073 Filed 1-17-13; 4:15 pm]
BILLING CODE 4153-01-P
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.