Grants, Contracts, and Other Agreements: Fraud and Abuse; Information Blocking; Office of Inspector General's Civil Money Penalty Rules, 42820-42841 [2023-13851]
Download as PDF
42820
Federal Register / Vol. 88, No. 126 / Monday, July 3, 2023 / Rules and Regulations
DEPARTMENT OF HEALTH AND
HUMAN SERVICES
Office of Inspector General
42 CFR Parts 1003 and 1005
RIN 0936–AA09
Grants, Contracts, and Other
Agreements: Fraud and Abuse;
Information Blocking; Office of
Inspector General’s Civil Money
Penalty Rules
Office of Inspector General
(OIG), Department of Health and Human
Services (HHS).
ACTION: Final rule.
AGENCY:
This final rule amends the
civil money penalty (CMP) regulations
of the Department of Health and Human
Services (HHS) Office of Inspector
General (OIG) to: incorporate new CMP
authority for information blocking;
incorporate new authorities for CMPs,
assessments, and exclusions related to
HHS grants, contracts, other agreements;
and increase the maximum penalties for
certain CMP violations.
DATES: This final rule is effective August
2, 2023, except for the additions of
§§ 1003.1400, 1003.1410, and 1003.1420
(amendatory instruction 10), which are
effective on September 1, 2023.
FOR FURTHER INFORMATION CONTACT:
Robert Penezic, (202) 539–4021,
robert.penezic@oig.hhs.gov.
SUPPLEMENTARY INFORMATION:
SUMMARY:
I. Executive Summary
lotter on DSK11XQN23PROD with RULES2
A. Purpose and Need for Regulatory
Action
This final rule implements three
statutory provisions: (1) the amendment
of the Public Health Service Act
(PHSA), 42 U.S.C. 300jj–52, by the 21st
Century Cures Act (Cures Act)
authorizing OIG to investigate claims of
information blocking and providing the
Secretary of HHS (Secretary) authority
to impose CMPs for information
blocking; (2) the amendment of the Civil
Monetary Penalties Law (CMPL), 42
U.S.C. 1320a–7a, by the Cures Act,
Public Law 114–255, section 5003,
authorizing HHS to impose CMPs,
assessments, and exclusions upon
individuals and entities that engage in
fraud and other misconduct related to
HHS grants, contracts, and other
agreements (42 U.S.C. 1320a–7a(o)–(s));
and (3) the increase in penalty amounts
in the CMPL effected by the Bipartisan
Budget Act of 2018 (BBA 2018), Public
Law 115–123. Each of these statutory
amendments is discussed further below.
VerDate Sep<11>2014
17:49 Jun 30, 2023
Jkt 259001
First, section 4004 of the Cures Act
added section 3022 to the PHSA, 42
U.S.C. 300jj–52 which, among other
provisions, provides OIG the authority
to investigate claims of information
blocking and authorizes the Secretary to
impose CMPs against a defined set of
individuals and entities that OIG
determines committed information
blocking. Investigating and taking
enforcement action against individuals
and entities that engage in information
blocking are consistent with OIG’s
history of investigating serious
misconduct that impacts HHS programs
and beneficiaries. Information blocking
poses a threat to patient safety and
undermines efforts by providers, payers,
and others to make the health system
more efficient and effective. Information
blocking may also constitute an element
of a fraud scheme, such as by forcing
unnecessary tests or conditioning
information exchange on referrals.
Addressing the negative effects of
information blocking is consistent with
OIG’s mission to protect the integrity of
HHS programs, as well as the health and
welfare of program beneficiaries.
In this final rule, we implement
section 3022(b)(2)(C) of the PHSA,
which requires that the CMP for
information blocking follow the
procedures of section 1128A of the
Social Security Act (SSA). Specifically,
the final rule adds the information
blocking CMP authority to the existing
regulatory framework for the imposition
and appeal of CMPs, assessments, and
exclusions (42 CFR parts 1003 and
1005) pursuant to section 3022(b)(2)(C)
of the PHSA (42 U.S.C. 300jj–
52(b)(2)(C)). The amendments give
individuals and entities subject to CMPs
for information blocking the same
procedural rights that currently exist
under 42 CFR parts 1003 and 1005.
Through this final rule, we codify this
new information blocking authority at
42 CFR 1003.1400, 1003.1410, and
1003.1420.
The final rule also explains OIG’s
approach to enforcement, which will
focus on information blocking
allegations that pose greater risk to
patients, providers, and health care
programs, as well as OIG’s anticipated
consultation and coordination with the
Office of the National Coordinator for
Health Information Technology (ONC)
and other agencies, as appropriate, in
reviewing and investigating allegations
of information blocking.
On May 1, 2020, ONC published a
final rule, 21st Century Cures Act:
Interoperability, Information Blocking,
and the ONC Health IT Certification
Program (ONC Final Rule), in the
Federal Register. 85 FR 25642, May 1,
PO 00000
Frm 00002
Fmt 4701
Sfmt 4700
2020. Among other things, ONC through
the ONC Final Rule promulgated the
information blocking regulations
defining information blocking and
establishing exceptions to that
definition. OIG’s final rule incorporates
the relevant information blocking
regulations at 45 part 171 as the basis
for imposing CMPs for information
blocking.
Second, this final rule modifies 42
CFR parts 1003 and 1005 to add the new
authority related to fraud and other
misconduct involving grants, contracts,
and other agreements into the existing
regulatory framework for the imposition
and appeal of CMPs, assessments, and
exclusions. The additions: (1) expressly
enumerate in the regulation the grant,
contract, and other agreement fraud and
misconduct CMPL authority; and (2)
give individuals and entities sanctioned
for fraud and other misconduct related
to HHS grants, contracts, and other
agreements the same procedural and
appeal rights that currently exist under
42 CFR parts 1003 and 1005 for those
sanctioned under the CMPL and other
statutes for fraud and other misconduct
related to, among other things, the
Federal health care programs. In this
final rule, we codify these new
authorities and their corresponding
sanctions in the regulations at 42 CFR
1003.110, 1003.130, 1003.140, 1003.700,
1003.710, 1003.720, 1003.1550,
1003.1580, and 1005.1.
On February 9, 2018, the President
signed into law the BBA 2018. Section
50412 of the BBA 2018 amended the
CMPL to increase the amounts of certain
CMPs. 42 U.S.C. 1320a–7a(a), (b). This
final rule codifies the increased CMPs at
42 CFR part 1003. Specifically, for
conformity with the CMPL as amended
by the BBA 2018, we revise the CMPs
contained at 42 CFR 1003.210,
1003.310, and 1003.1010.
B. Legal Authority
The legal authority for this regulatory
action is found in the SSA and the
PHSA, as amended by the Cures Act and
the BBA 2018. The legal authority for
the changes is listed by the parts of title
42 of the Code of Federal Regulations
(CFR) that we propose to modify:
1003: 42 U.S.C. 1320a–7a(a)–(b), (o)–(s);
42 U.S.C. 300jj–52
1005: 42 U.S.C. 1320a–7a(o)–(s); 42
U.S.C. 300jj–52
C. Proposed Rule
On April 24, 2020, OIG published a
proposed rule (proposed pule) in the
Federal Register setting forth certain
proposed amendments to the CMP rules
of HHS OIG. 85 FR 22979, April 24,
2020. The proposed rule set forth
E:\FR\FM\03JYR2.SGM
03JYR2
Federal Register / Vol. 88, No. 126 / Monday, July 3, 2023 / Rules and Regulations
proposed regulations that would: (1)
incorporate the new CMP authority for
information blocking; (2) incorporate
new authorities for CMPs, assessments,
and exclusions related to HHS grants,
contracts, other agreements; and (3)
increase the maximum penalties for
certain CMP violations. We solicited
comments on those three proposed
regulatory additions and changes to
obtain public input. Specific to
information blocking, we also provided
information on—but did not propose
regulations for—our expected
enforcement priorities, the investigation
process, and our experience with
investigating conduct that includes an
intent element. We received 49 timely
comments, 48 of which were unique,
from a broad range of stakeholders.
lotter on DSK11XQN23PROD with RULES2
D. Final Rule
This final rule incorporates into OIG’s
CMP regulations at 42 CFR parts 1003
and 1005 two new CMP authorities
established by the Cures Act related to:
(1) information blocking; and (2) fraud
and other misconduct involving HHS
grants, contracts, and other agreements.
The final rule also incorporates into 42
CFR part 1003 new maximum CMP
amounts for certain offenses, as set by
the BBA 2018.
In the context of information
blocking, the Cures Act authorizes
CMPs for any practice that is likely to
interfere with, prevent, or materially
discourage access, exchange, or use of
electronic health information (EHI) if
the practice is conducted by an entity
that is: a developer of certified health
information technology (IT); offering
certified health IT; a health information
exchange (HIE); or a health information
network (HIN) and the entity knows or
should know that the practice is likely
to interfere with, prevent, or materially
discourage the access, exchange, or use
of EHI.
The ONC Final Rule implements
certain Cures Act information blocking
provisions, including defining terms
and establishing reasonable and
necessary activities that do not
constitute information blocking or
‘‘exceptions’’ to the definition of
information blocking. OIG and ONC
have coordinated extensively on the
ONC Final Rule and this final rule to
align both sets of regulations. As
proposed, we incorporate the regulatory
definitions and exceptions in ONC’s
regulations at 45 CFR part 171 related to
information blocking as the basis for
imposing CMPs and determining the
amount of penalty imposed.
In the context of HHS grants,
contracts, and other agreements, the
VerDate Sep<11>2014
17:49 Jun 30, 2023
Jkt 259001
Cures Act authorizes CMPs,
assessments, and exclusions for:
• knowingly presenting or causing to
be presented a specified claim under a
grant, contract, or other agreement that
a person knows or should know is false
or fraudulent;
• knowingly making, using, or
causing to be made or used any false
statement, omission, or
misrepresentation of a material fact in
any application, proposal, bid, progress
report, or other document that is
required to be submitted in order to
directly or indirectly receive or retain
funds provided in whole or in part by
HHS pursuant to a grant, contract, or
other agreement;
• knowingly making, using, or
causing to be made or used, a false
record or statement material to a false or
fraudulent specified claim under a
grant, contract, or other agreement;
• knowingly making, using, or
causing to be made or used, a false
record or statement material to an
obligation to pay or transmit funds or
property to HHS with respect to a grant,
contract, or other agreement;
• knowingly concealing or knowingly
and improperly avoiding or decreasing
an obligation to pay or transmit funds or
property to HHS with respect to a grant,
contract, or other agreement; and
• failing to grant timely access, upon
reasonable request, to OIG for the
purposes of audits, investigations,
evaluations, or other statutory functions
of OIG in matters involving grants,
contracts, or other agreements.
We further codify changes to the CMP
regulations at 42 CFR part 1003 to
conform with the CMP amounts
contained in the SSA, as amended by
the BBA 2018.
II. Background
For more than 35 years, OIG has
exercised authority to impose CMPs,
assessments, and exclusions in
furtherance of its mission to protect
Federal health care and other Federal
programs from fraud, waste, and abuse.
The Cures Act established new CMP
authorities related both to information
blocking and to fraud and other
prohibited conduct involving HHS
grants, contracts, and other agreements.
OIG also received authority through the
BBA 2018 to impose larger CMPs for
certain offenses committed after
February 9, 2018.
A. Overview of OIG Civil Money Penalty
Authorities
The CMPL (section 1128A of the SSA,
42 U.S.C. 1320a–7a) was enacted in
1981 to provide HHS with the statutory
authority to impose CMPs, assessments,
PO 00000
Frm 00003
Fmt 4701
Sfmt 4700
42821
and exclusions upon persons who
commit fraud and other misconduct
related to Federal health care programs,
including Medicare and Medicaid. The
Secretary delegated the CMPL’s
authorities to OIG. 53 FR 12993, April
20, 1988. HHS has promulgated
regulations at 42 CFR parts 1003 and
1005 that: (1) enumerate specific bases
for the imposition of CMPs,
assessments, and exclusion under the
CMPL and other CMP statutes; (2) set
forth the appeal rights of persons subject
to those sanctions; and (3) outline the
procedures under which a sanctioned
party may appeal the sanction. Since
1981, Congress has created various other
CMP authorities related to fraud and
abuse that were delegated by the
Secretary to OIG and added to part
1003.
B. The Cures Act and the ONC Final
Rule
The Cures Act added section 3022 of
the PHSA, which defines conduct that
constitutes information blocking by
health IT developers of certified health
IT, entities offering certified health IT,
HIEs, HINs, and health care providers.
Section 3022(a) of the PHSA defines
information blocking as a practice that—
(A) except as required by law or
specified by the Secretary pursuant to
rulemaking under section 3022(a)(3), is
likely to interfere with, prevent, or
materially discourage access, exchange,
or use of electronic health information;
and (B)(i) if conducted by a health
information technology developer,
exchange, or network, such developer,
exchange, or network knows, or should
know, that such practice is likely to
interfere with, prevent, or materially
discourage the access, exchange, or use
of electronic health information; or (ii)
if conducted by a health care provider,
such provider knows that such practice
is unreasonable and is likely to interfere
with, prevent, or materially discourage
access, exchange, or use of electronic
health information. Section 3022(a)(3) of
the PHSA provides that the Secretary
shall, through rulemaking, identify
reasonable and necessary activities that
do not constitute information blocking,
and section 3022(a)(4) of the PHSA
states that the term ‘‘information
blocking’’ does not include any conduct
that occurred before January 13, 2017.
The ONC Final Rule implements these
sections of the PHSA at 45 CFR part
171.
Section 3022(b)(1) of the PHSA
authorizes OIG to investigate claims of
information blocking described in
section 3022(a) of the PHSA, and to
investigate claims that health IT
developers of certified health IT or other
E:\FR\FM\03JYR2.SGM
03JYR2
lotter on DSK11XQN23PROD with RULES2
42822
Federal Register / Vol. 88, No. 126 / Monday, July 3, 2023 / Rules and Regulations
entities offering certified health IT have
submitted false attestations under
section 3001(c)(5)(D) of the PHSA as
part of ONC’s program for the voluntary
certification of health IT (ONC Health IT
Certification Program). Section
3022(b)(2)(A) authorizes the Secretary to
impose CMPs not to exceed $1 million
per violation on health IT developers of
certified health IT or other entities
offering certified health IT, HIEs, and
HINs that OIG determines, following an
investigation, committed information
blocking. Section 3022(b)(2)(A) also
provides that a determination of the
CMP amounts shall consider factors
such as the nature and extent of the
information blocking and harm resulting
from such information blocking
including, where applicable, the
number of patients affected, the number
of providers affected, and the number of
days the information blocking persisted.
Section 3022(b)(2)(C) of the PHSA
applies the procedures of section 1128A
of the SSA to CMPs imposed under
section 3022(b)(2) of the PHSA in the
same manner as such provisions apply
to a CMP or proceeding under section
1128A(a) of the SSA. This final rule
implements section 3022(b)(2)(A) and
(C) of the PHSA.
Furthermore, section 3022(b)(2)(B) of
the PHSA provides that any health care
provider determined by OIG to have
committed information blocking shall
be referred to the appropriate agency to
be subject to appropriate disincentives
using authorities under applicable
Federal law, as the Secretary of HHS
sets forth through notice and comment
rulemaking. This final rule does not
implement section 3022(b)(2)(B) of the
PHSA. However, a health IT developer
of certified health IT, HIE, or HIN as
defined in 45 CFR 171.102 determined
by OIG to have committed information
blocking could be subject to CMPs
under this final rule even if that entity
also met the definition of a health care
provider at 45 CFR 171.102. For
additional discussion related to health
care providers that meet a definition of
an actor subject to CMPs, see section
IV.A.3. of this preamble.
The Cures Act also identifies ways for
ONC, the Office for Civil Rights (OCR),
and OIG to consult, refer, and
coordinate. For example, section
3022(b)(3) of the PHSA states that OIG
may refer instances of information
blocking to OCR when a consultation
regarding the health privacy and
security rules promulgated under
section 264(c) of the Health Insurance
Portability and Accountability Act of
1996 (HIPAA) will resolve such
information blocking claims.
Additionally, section 3022(d)(1) of the
VerDate Sep<11>2014
17:49 Jun 30, 2023
Jkt 259001
PHSA requires ONC to share
information with OIG as required by
law. For additional discussion related to
coordination, see section III.A.5 of the
proposed rule preamble and section
III.B. of this preamble.
ONC’s information blocking
regulations at 45 CFR part 171 and the
OIG CMP regulation at 42 CFR part
1003, subpart N, are designed to work
in tandem. As a result, we encourage
parties to read this final rule together
with the ONC Final Rule. The ONC
Final Rule defined ‘‘information
blocking’’—and specific terms related to
information blocking—as well as
implemented exceptions to the
definition of information blocking. This
final rule describes the parameters and
procedures applicable to the CMP for
information blocking.
The Cures Act amended the CMPL to
give HHS the authority to impose CMPs,
assessments, and exclusions upon
persons that commit fraud and other
misconduct related to HHS grants,
contracts, and other agreements. 42
U.S.C. 1320a–7a(o)–(s). This authority
allows for the imposition of sanctions
for a wide variety of fraudulent and
improper conduct involving HHS
grants, contracts, and other agreements
including, among other things, the
making of false or fraudulent specified
claims to HHS, the submission of false
or fraudulent documents to HHS, and
the creation of false records related to
HHS grants, contracts, or other
agreements. The authority applies to a
broad array of situations in which HHS
provides funding, directly or indirectly,
in whole or in part, pursuant to a grant,
contract, or other agreement. The Cures
Act also created a new set of definitions
related to grant, contract, and other
agreement fraud and misconduct,
outlined the sanctions for violation of
the statute, and referenced the
procedures to be used when imposing
sanctions under the statute.
C. The Bipartisan Budget Act of 2018
The BBA 2018 amended the CMPL to
increase certain CMP amounts
contained in 42 U.S.C. 1320a–7a(a) and
(b). The BBA 2018 increased the
maximum CMP amounts in section
1128A(a) of the SSA (42 U.S.C. 1320a–
7a) from $10,000 to $20,000; from
$15,000 to $30,000; and from $50,000 to
$100,000. The BBA 2018 increased the
maximum CMP amounts in section
1128A(b) of the SSA from $2,000 to
$5,000 in paragraph (1), from $2,000 to
$5,000 in paragraph (2), and from
$5,000 to $10,000 in paragraph (3)(A)(i).
This statutory increase in CMP amounts
is effective for acts committed after the
date of enactment, February 9, 2018.
PO 00000
Frm 00004
Fmt 4701
Sfmt 4700
This final rule updates our regulations
to reflect the increased CMP amounts
authorized by the 2018 BBA
amendments.
III. OIG’s Anticipated Approach to
Information Blocking CMP Enforcement
The preamble to the proposed rule
provided a nonbinding, informational
overview of our anticipated information
blocking enforcement priorities and the
investigative process. We provided this
information in the preamble to the
proposed rule for informational
purposes only and did not propose
regulations on these topics. We received
several comments on these topics,
which are publicly available at https://
www.regulations.gov/docket/HHSIG2020-0001/comments. To improve
public understanding of how we
anticipate we will approach information
blocking CMP enforcement, we further
provide in section III of this preamble
an informational statement to
supplement the discussion set forth in
the proposed rule. We note that this
discussion of anticipated approach is
limited to our investigation of those
entities subject to CMPs and does not
apply to the investigation of health care
providers that may be referred for
disincentives under section
3022(b)(2)(B) of the PHSA.
A. Anticipated Priorities
The preamble to the proposed rule set
forth our anticipated information
blocking enforcement priorities as
conduct that: (1) resulted in, is causing,
or had the potential to cause patient
harm; (2) significantly impacted a
provider’s ability to care for patients; (3)
was of long duration; (4) caused
financial loss to Federal health care
programs, or other government or
private entities; or (5) was performed
with actual knowledge. We explained
that we will select cases for
investigation based on these priorities
and expect that the enforcement
priorities will evolve as OIG gains more
experience investigating information
blocking. We also emphasized that the
definition of information blocking—as
defined in section 3022(a) of the PHSA
and 45 CFR 171.103(a)—includes an
element of intent and that OIG lacked
the authority to seek CMPs for
information blocking against actors who
did not have the requisite intent. We
continue to anticipate the same
enforcement priorities as set out in the
preamble of the proposed rule and
supplement that discussion below. We
provide this explanation so that the
public and stakeholders have a better
understanding of how we anticipate
allocating our resources to enforce the
E:\FR\FM\03JYR2.SGM
03JYR2
lotter on DSK11XQN23PROD with RULES2
Federal Register / Vol. 88, No. 126 / Monday, July 3, 2023 / Rules and Regulations
CMP for information blocking.
Prioritization ensures OIG can
effectively allocate its resources to target
information blocking allegations that
have more negative effects on patients,
providers, and health care programs.
Our enforcement priorities will inform
our decisions about which information
blocking allegations to pursue, but these
priorities are not dispositive. Each
allegation will present unique facts and
circumstances that must be assessed
individually. Each allegation will be
assessed to determine whether it
implicates one or more of the
enforcement priorities, or otherwise
merits further investigation and
potential enforcement action. There is
no specific formula we can apply to
every allegation that allows OIG to
effectively evaluate and prioritize which
claims merit investigation.
As addressed in section III.B of this
preamble, we anticipate coordinating
closely with ONC and other agencies as
appropriate in reviewing allegations.
Although our statement of anticipated
priorities is framed around individual
allegations, OIG may evaluate
allegations and prioritize investigations
based in part on the volume of claims
relating to the same (or similar) conduct
by the same actor. That evaluation
would include assessment of all
information blocking claims received by
ONC through the standardized process
to receive claims from the public.
We clarify here that OIG’s anticipated
priority relating to patient harm is not
specific to individual harm, but rather
may broadly encompass harm to a
patient population, community, or the
public. Additionally, with respect to our
anticipated priority relating to actual
knowledge, we note that health IT
developers of certified health IT and
health information exchanges and
networks do not have to have actual
knowledge in order to commit
information blocking. But the conduct
of someone who has actual knowledge
is generally more egregious than the
conduct of someone who only should
know that their practice is likely to
interfere with, prevent, or materially
discourage access, exchange, or use of
EHI. As a general matter, we would
likely prioritize cases in which an actor
has actual knowledge over cases in
which the actor only should have
known that the practice was likely to
interfere with, prevent, or materially
discourage the access, exchange, or use
of EHI.
Finally, we are stating that our current
anticipated enforcement priorities may
lead to investigations of anticompetitive conduct or unreasonable
business practices. The ONC Final Rule
VerDate Sep<11>2014
17:49 Jun 30, 2023
Jkt 259001
provides, as examples, conduct that may
implicate the information blocking
provision, anti-competitive or
unreasonable conduct, such as
unconscionable or one-sided business
terms for the access, exchange, or use of
EHI, or the licensing of an
interoperability element. For example, a
contract containing unconscionable
terms related to sharing of patient data
could be anti-competitive conduct that
impedes a provider’s ability to care for
patients. 85 FR 25812, May 1, 2020. A
claim of such conduct would implicate
OIG’s enforcement priority related to a
provider’s ability to care for patients.
Anti-competitive conduct resulting in
information blocking could implicate
other enforcement priorities as well,
depending on the facts.
OIG’s enforcement priorities are a tool
we use to triage allegations and allocate
resources. We can and do expect to
investigate allegations of other
information blocking conduct not
covered by the priorities. If conduct or
patterns of conduct raise concerns, OIG
may choose to investigate those
allegations. And as we gain more
experience with investigating
information blocking, we will reassess
our priorities accordingly. For example,
as patients continue to adopt and use
technology to access their EHI, the
number of patients that will request
their EHI directly from a health IT
developer of certified health IT or HIE
may increase. That may generate more
allegations related to patient access to
their EHI. Trends or changes in the
types of allegations we receive may
affect enforcement priorities in the
future.
B. Coordination With Other Agencies
The Cures Act identified ways for
ONC, OCR, and OIG to consult, refer,
and coordinate on information blocking
claims. We elaborate on those processes
here for informational purposes only.
Section 3022(d)(1) of the PHSA states
that ONC may serve as a technical
consultant to OIG. Because ONC
promulgated the information blocking
regulations and exceptions, OIG will
closely consult with ONC throughout
the investigative process. ONC’s subject
matter expertise is vital to our
evaluation of information blocking
allegations. OIG will continue working
closely with ONC as ONC develops
information blocking guidance.
Section 3022(d)(3) of the PHSA
requires ONC to implement a
standardized process for the public to
submit reports on claims of information
blocking, and section 3022(d)(1)
requires ONC to share information with
OIG as required by law. ONC has a
PO 00000
Frm 00005
Fmt 4701
Sfmt 4700
42823
standardized process for the public to
submit reports on claims of information
blocking through this website: https://
inquiry.healthit.gov/support/plugins/
servlet/desk/portal/6. In addition to the
process required by the PHSA, OIG has
its own hotline process through which
individuals may submit claims of
information blocking online at https://
tips.oig.hhs.gov/ or by calling 1–800–
447–8477. Regardless of whether a
claim is made to ONC or OIG, ONC and
OIG will coordinate in evaluating claims
of information blocking and share
information as permitted by law.
Whether OIG’s or ONC’s authority is
appropriate to address a claim of
information blocking will depend on the
facts and circumstances of the allegation
and the results of an investigation. For
example, ONC and OIG may initially
agree that a claim is most appropriately
evaluated through an OIG investigation.
ONC has authority to take action against
an individual or entity that is a
developer participating in the ONC
Health IT Certification Program. 45 CFR
170.580. OIG has authority to impose
CMPs against a health IT developer of
certified health IT, which includes
developers participating in the ONC
Health IT Certification Program. Thus,
an individual or entity that meets the
definition of health IT developer of
certified health IT could be subject to
CMPs, termination of certification or
other action under the ONC Health IT
Certification Program review process, or
both. 85 FR 25789, May 1, 2020.
In addition to coordination with ONC,
section 3022(b)(3) of the PHSA provides
the option for OIG to refer instances of
information blocking to OCR when a
consultation regarding the health
privacy and security rules promulgated
under section 264(c) of HIPAA will
resolve such information blocking
claims. Depending on the facts and
circumstances of an information
blocking claim, OIG will exercise this
statutory discretion as appropriate to
refer persons to consult with OCR to
resolve information blocking claims.
There is no set of facts or circumstances
that will always be referred to OCR. OIG
will work with OCR to determine which
claims should be referred to OCR under
the new authorities found in section
3022(b)(3) of the PHSA. In addition to
section 3022(b)(3), OIG may request
technical assistance from OCR during an
information blocking investigation. OIG
may also refer to OCR claims of
information blocking that would be
better resolved under OCR’s HIPAA
authorities.
Specific to anti-competitive conduct,
we note that section 3022(d) of the
PHSA includes specific options for ONC
E:\FR\FM\03JYR2.SGM
03JYR2
42824
Federal Register / Vol. 88, No. 126 / Monday, July 3, 2023 / Rules and Regulations
lotter on DSK11XQN23PROD with RULES2
and OIG to coordinate with the Federal
Trade Commission (FTC) related to an
information blocking claim. Under
section 3022(d)(1) of the PHSA, ONC
may share information related to claims
of information blocking or
investigations by OIG with the FTC for
purposes of such investigation. We will
coordinate closely with ONC to identify
claims and investigations or patterns of
claims and investigations that may
warrant referral to the FTC.
We further note that following our
investigation and the imposition of
CMPs, our coordination with ONC,
OCR, or other agencies as relevant may
continue as part of an appeal of the
imposition of CMPs by OIG. Upon the
issuance of a notice of proposed
determination for a CMP in accordance
with 42 CFR 1003.1500, the actor may
appeal the proposed determination for a
CMP in accordance with the appeal
procedures set forth in 42 CFR part
1005. As noted in 42 CFR 1005.2(a), a
party sanctioned under any criteria in
42 CFR part 1003 may request a hearing
before an administrative law judge
(ALJ). 42 CFR 1005.2. The facts of the
matter under appeal will determine the
specific agencies with which we may
coordinate.
We also anticipate coordinating with
other HHS agencies to avoid duplicate
penalties. Section 3022(d)(4) of the
PHSA requires that the Secretary, to the
extent possible, ensure that penalties do
not duplicate penalty structures that
would otherwise apply to information
blocking and the type of individual or
entity involved as of the day before the
enactment of the Cures Act, December
13, 2016. Depending on the facts and
circumstances, OIG might also consult
or coordinate with a range of other
agencies that might have relevant
information or be able to provide
technical assistance, including the
Centers for Medicare and Medicare
Services (CMS), other HHS agencies,
FTC, or others. We discuss what
enforcement coordination may look like
in section III.D of the preamble.
C. Anticipated Enforcement Approach
Some commenters expressed interest
in understanding OIG’s enforcement
approach, including: (1) whether OIG
would include alternative actions, in
lieu of the imposition of CMPs, such as
providing actors subject to CMPs with
additional education or corrective
action plans; (2) whether OIG’s
approach to information blocking
investigations would include
investigating potential non-compliance
with the requirements of CMS’s
Promoting Interoperability Program for
eligible hospitals and critical access
VerDate Sep<11>2014
17:49 Jun 30, 2023
Jkt 259001
hospitals (CAHs) and Merit-based
Incentive Payment System (MIPS)
promoting interoperability performance
category for clinicians; (3) whether
actors may be subject to False Claims
Act (FCA) liability for engaging in
conduct that constitutes information
blocking; and (4) whether OIG plans to
create a self-disclosure protocol (SDP).
At this point, we do not anticipate
using alternatives to CMPs as described
by the commenters. OIG will have an
SDP to resolve CMP liability and allow
for lower penalties. As we gain more
experience investigating and imposing
CMPs for information blocking, we may
further consider alternative enforcement
approaches. HHS or OIG may also
consider issuance of compliance
guidance or other educational materials
on the topic of information blocking.
OIG’s historical position in its
administrative enforcement under the
CMPL is that the Federal health care
programs are best protected when
persons who engage in fraudulent or
other improper conduct are assessed a
financial sanction. This remedial
purpose is at the core of OIG’s
administrative enforcement authorities.
The PHSA and existing regulatory
structures provide options for ONC and
OCR to conduct individualized
education and corrective action plans
when an actor has committed
information blocking, and OIG may refer
matters to ONC or OCR for such actions.
For example, OIG may refer an
allegation to OCR for consultation
regarding the health privacy and
security rules or for OCR to address
under its HIPAA authorities. Similarly,
OIG may refer an allegation to ONC to
address under its direct review
authority, under which ONC could
impose a corrective action plan. ONC
also stated in the ONC Final Rule that
ONC’s and OIG’s respective authorities
are independent and that either office
may exercise its authority at any time.
85 FR 25789, May 1, 2020. Thus, OIG’s
enforcement action will only include a
CMP, while ONC could purse a separate
enforcement action within its authority,
which could include a corrective action
plan.
As noted above, this rulemaking does
not address OIG investigations of
potential information blocking by
healthcare providers. HHS is developing
a separate notice of proposed
rulemaking to establish appropriate
disincentives for healthcare providers as
described in the Unified Agenda at
https://www.reginfo.gov/public/do/
eAgendaViewRule?pubId=
202210&RIN=0955-AA05. However, in
response to commenters’ inquiry we
clarify that OIG does not intend to use
PO 00000
Frm 00006
Fmt 4701
Sfmt 4700
its authority to investigate information
blocking under section 3022(b)(1) of the
PHSA to investigate potential noncompliance with CMS programmatic
requirements, including those under the
Promoting Interoperability Program for
eligible hospitals and CAHs and MIPS
promoting interoperability performance
category for clinicians, that are distinct
from the information blocking
provisions of the PHSA. If investigations
into alleged information blocking
suggest a health care provider may be
out of compliance with CMS
programmatic requirements, OIG may
refer such matters to CMS.
Similarly, conduct that constitutes
information blocking could create false
claims liability for an actor. For
example, by engaging in conduct that
constitutes information blocking, a
health IT developer of certified health
IT may have falsified attestations made
to ONC as part of the ONC Health IT
Certification Program. By falsifying its
attestation, the health IT developer of
certified health IT may cause health care
providers to file false attestations under
MIPS. Such a fact-specific
determination would be assessed in
coordination with OIG’s law
enforcement partners, including the
Department of Justice.
Information blocking is newly
regulated conduct, and OIG has not
created an SDP specifically for
information blocking; however, after the
publication of this rule, OIG will add an
information blocking SDP, including an
online submission form, and other
processes, to OIG’s existing SDP located
at https://oig.hhs.gov/compliance/selfdisclosure-info/.
We understand many stakeholders
may not be familiar with OIG’s current
SDP and provide the following
information regarding the forthcoming
information blocking SDP and selfdisclosure process. The information
blocking SDP will provide actors with a
framework and mechanism for
evaluating, disclosing, coordinating, and
resolving CMP liability for conduct that
constitutes information blocking. When
posted on our website, OIG’s SDP will
explain: (1) eligibility criteria, (2)
manner and format, (3) required
contents of a submission, and (4)
expected resolution of the matter. The
information blocking SDP will be
available only to those actors seeking to
resolve potential CMP liability.
We recognize that whether to disclose
potential information blocking
violations to OIG is a significant
decision; however, the significant
benefits to disclosing potential
information blocking violations to OIG
should make that decision easier. First,
E:\FR\FM\03JYR2.SGM
03JYR2
lotter on DSK11XQN23PROD with RULES2
Federal Register / Vol. 88, No. 126 / Monday, July 3, 2023 / Rules and Regulations
actors accepted by OIG into the SDP
who cooperate with OIG during the selfdisclosure process will pay lower
damages than would normally be
required in resolving a governmentinitiated investigation. Second, through
our experience with OIG’s existing SDP,
we know that self-disclosure provides
the opportunity for an actor to avoid
costs and disruptions associated with
government-directed investigations and
civil or administrative litigation.
Finally, OIG created the original SDP to
provide a consistent, specific, and
detailed process that can be relied upon
by all participants, and we are similarly
committed to working with actors that
use the SDP in good faith to disclose
information blocking conduct and
cooperate with OIG’s review and
resolution process.
We reiterate that self-disclosing
conduct is for an actor to resolve its own
potential liability under the CMP for
information blocking. It would not
resolve any liability an actor may have
under other applicable law, such as
under HIPAA or under the ONC
Certification Program. Actors should not
self-disclose to seek opinions from OIG
as to whether an individual or entity
meets the definitions of a ‘‘health IT
developer of certified health IT’’ or
‘‘health information network or health
information exchange’’ in 45 CFR
171.102 or whether conduct constitutes
information blocking under section
3022(a) of the PHSA and corresponding
implementing regulations. Actors
seeking to inform OIG about another
individual’s conduct should use the
ONC portal or the OIG hotline.
As mentioned above, OIG will
provide additional information on our
website regarding the SDP for
information blocking after publication
of this final rule. However, before such
information is posted, OIG will accept
self-disclosure of information blocking
conduct. We refer actors to section
IV.A.5 of the preamble that describes
how we will evaluate disclosure of
violations and cooperation with
investigations.
Specifically, it is a mitigating
circumstance under the factors at 42
CFR 1003.140(a)(2) for an actor to take
appropriate and timely corrective action
in response to a violation. Timely
corrective action includes disclosing
information blocking violations to OIG
and fully cooperating with OIG’s review
and resolution of such disclosure.
conduct constitutes information
blocking for which OIG may impose a
CMP. Pursuant to section 1128D(b) of
the SSA, HHS, through OIG, publishes
advisory opinions regarding the
application of the Federal anti-kickback
statute and the associated safe harbor
provisions, as well as specified
administrative sanction authorities, to
proposed or existing arrangements.
Section 1128D(b) specifies the matters
subject to advisory opinions under that
authority. The CMP for information
blocking is not one of the administrative
sanction authorities specified by section
1128D(b) of the SSA.
Furthermore, the Cures Act did not
establish an advisory opinion process
with regard to the application of OIG’s
information blocking-related
administrative enforcement authorities.
At present, OIG has no plans to develop
and establish an advisory opinion
process regarding the application of the
CMP for information blocking. The
Justification of Estimates to the
Appropriations Committee for the
President’s fiscal year (FY) 2024 budget
included a legislative proposal to
provide HHS the authority to issue
advisory opinions on information
blocking practices.
D. Advisory Opinions
Some commenters requested that OIG
develop an advisory opinion process for
individuals and entities to obtain
advisory opinions on whether specified
1. Information Blocking CMP Regulatory
Authority & CMP Process
VerDate Sep<11>2014
17:49 Jun 30, 2023
Jkt 259001
IV. Summary of Final Rule Provisions,
Public Comments, and OIG Response
A. The CMP for Information Blocking
As a general matter, commenters were
supportive of OIG’s proposed
information blocking rules but sought
more information and guidance from
both ONC and OIG. Commenters
suggested that the effective date for the
CMP for information blocking rules be
delayed as a result of the ongoing public
health emergency (PHE) due to SARS–
CoV–2, which causes COVID–19, and
the requests for additional guidance
from ONC and OIG. Many commenters
sought clarification on the ONC Final
Rule, such as whether an individual or
entity falls within the category of actors
that OIG would subject to CMPs for
information blocking. Many
commenters requested that OIG, either
in this final rule or through guidance,
further elaborate on and provide
examples of how OIG will determine
violations and CMP amounts. We have
considered these comments carefully in
developing the final rule, as described
in more detail in responses to
comments.
We proposed to add the CMP for
information blocking to our existing
CMP regulations at 42 CFR part 1003
PO 00000
Frm 00007
Fmt 4701
Sfmt 4700
42825
and to apply the existing procedural and
appeal rights at 42 CFR parts 1003 and
1005 to the CMP for information
blocking. We solicited comment on the
proposed application of the existing
CMP procedures and appeal process in
parts 1003 and 1005 to the CMP for
information blocking. Commenters were
generally in favor of incorporating the
CMP for information blocking into these
sections and applying the existing
appeal processes set forth at 42 CFR part
1005. In this rule, we finalize the
addition of the CMP for information
blocking to 42 CFR part 1003 and the
application of parts 1003 and 1005 to
the CMP for information blocking as
proposed without modification.
We also proposed to add the authority
for OIG’s imposition of CMPs for
information blocking (section 3022 of
the PHSA, 42 U.S.C. 300jj–52) to the list
of statutory CMP provisions that
appears in 42 CFR 1003.100. We
received no comment on this proposed
change and finalize the rule as proposed
without modification.
Comment: One commenter believed
that the application of 42 CFR 1005.7 to
the CMP for information blocking was
unworkable in its current form. The
commenter believed that the discovery
process under 42 CFR 1005.7 as
currently written was inconsistent with
the Cures Act’s intent for ONC, OCR,
and OIG to consult, refer, and
coordinate in the investigation and
enforcement of investigation blocking.
The commenter further stated that,
consistent with the prior OIG final rule,
Amendments to the OIG Exclusion and
CMP Authorities Resulting From Public
Law 100–93, 57 FR 3325, January 29,
1992, OIG would only be required to
produce documents in its possession
and not documents in the possession of
other branches or divisions of HHS. The
commenter further believed 42 CFR
1005.7 as written would prohibit
individuals and entities that appeal the
imposition of CMPs for information
blocking from obtaining relevant
documentary evidence maintained in
ONC’s possession. The commenter also
believed that OIG could abuse the
discovery process by refusing to take
‘‘possession’’ of documents in ONC’s
care, custody, or control in an effort to
avoid producing them. The commenter
further believed that, as ONC would not
be covered by the discovery rule at 42
CFR 1005.7, ONC would not be subject
to any document preservation
requirement that would increase the
potential for the spoliation or
destruction of evidence.
Response: We did not propose
revising—and this final rule does not
make revisions to—42 CFR 1005.7. The
E:\FR\FM\03JYR2.SGM
03JYR2
lotter on DSK11XQN23PROD with RULES2
42826
Federal Register / Vol. 88, No. 126 / Monday, July 3, 2023 / Rules and Regulations
CMP for information blocking appeals
will be subject to discovery rules in 42
CFR 1005.7 because the Cures Act
requires OIG to follow existing CMP
procedures. Section 3022(b)(2)(C) of the
PHSA requires the CMP for information
blocking to follow procedures of section
1128A of the SSA, and 42 CFR part 1005
implements those procedures.
Therefore, applying the procedures at 42
CFR part 1005 to CMP for information
blocking appeals is consistent with the
Cures Act.
We appreciate that the CMP appeals
process and the discovery provided
therein may be new for many actors
subject to CMPs for information
blocking, and we further elaborate
below.
Whenever we propose to impose
CMPs for information blocking, the
actor will have the opportunity to
appeal the CMPs. That appeal will be
heard by an administrative law judge
(ALJ) and governed by the procedures
set forth in 42 CFR part 1005. The
regulation at 42 CFR 1005.7 addresses
discovery and allows each party to
request that the other party produce
nonprivileged documents that are
relevant and material to the issues
before the ALJ for inspection and
copying. If the other party objects to
producing the requested documents, the
party requesting the documents can ask
the ALJ to compel discovery.
The discovery regulations that will
apply to appeals of CMPs for
information blocking are the same
regulations that have applied to existing
CMPL administrative litigation. These
regulations and this process have been
approved by administrative tribunals
and Federal courts. We provide limited
discovery in our CMP cases even though
it is not required in administrative
proceedings at all. 57 FR 3298, January
29, 1992. The regulation at 42 CFR
1005.7 limits discovery to the exchange
of material and relevant documents to
avoid the time-consuming discovery
fights that can affect civil litigation.
Additionally, the vast bulk of material
and relevant evidence (i.e., evidence
relating to whether the actor committed
information blocking) will come from
the actor whose conduct is at issue and
not the government.
In addition to the specific discovery
rules in 42 CFR 1005.7, there are other
provisions in 42 CFR part 1005 that
ensure transparency and fairness in an
appeal. For example, 42 CFR 1005.8
calls for the parties to exchange witness
lists, copies of prior written statements
of proposed witnesses, and copies of
proposed hearing exhibits. If OIG
proposed to use documents or testimony
from ONC or other government agencies
VerDate Sep<11>2014
17:49 Jun 30, 2023
Jkt 259001
as evidence in support of the imposition
of CMPs, those exhibits and statements
would be made available under 42 CFR
1005.8.
Regarding the commenter’s specific
concern that 42 CFR 1005.7 is not
consistent with the coordination with
ONC and OCR suggested by the Cures
Act, we do not agree. The Cures Act
provides OIG the discretionary authority
to coordinate or consult with ONC and
OCR, as necessary. For example, under
section 3022(b)(3)(A) of the PHSA, OIG
‘‘may refer’’ instances of information
blocking to OCR if we determine that
consulting with OCR may resolve an
information blocking claim. While not
required, we expect that nearly all
information blocking investigations will
be done in coordination with ONC. This
close coordination with another HHS
agency is not unique to information
blocking or the Cures Act. Many of our
CMP cases involve similarly close
coordination with CMS, for example.
There is nothing unique to the Cures
Act that would necessitate a change
from our current discovery procedures.
We do not agree with the commenter’s
concerns about spoliation or destruction
of documents in ONC’s possession. ONC
would not be a party to discovery in a
CMP for information blocking matter, so
the concept of spoliation—at least as the
term is used in civil litigation—would
be inapplicable. Regardless, as a part of
the Federal Government ONC is subject
to regulations and policies governing
document maintenance and retention,
including those promulgated by the
National Archives and Records
Administration.
Comment: Some commenters
expressed interest in more information
about documentation and record
retention requirements. They wanted to
understand how to demonstrate
compliance with an information
blocking exception.
Response: We did not propose and are
not finalizing a record retention
requirement specific to the CMP for
information blocking. Furthermore, this
final rule does not provide additional
guidance regarding which documents
are required to demonstrate compliance
with an ONC exception for information
blocking because that is outside the
scope of this rule and OIG’s authority.
OIG will consider any documentation
provided by an actor during an
investigation to evaluate whether a
practice constitutes information
blocking.
OIG has 6 years from the date an actor
committed a practice that constitutes
information blocking to impose a CMP.
Section 3022(b)(2)(C) of the PHSA
requires that the CMP for information
PO 00000
Frm 00008
Fmt 4701
Sfmt 4700
blocking follow the procedures under
section 1128A of the SSA, and section
1128A(c)(1) requires that an action for
CMPs must be initiated within 6 years
from the date the violation occurred.
Even though pursuant to section
1128A of the SSA OIG may commence
an action to impose CMPs up to 6 years
after the date of a violation, an actor
may want to maintain information for
additional time beyond 6 years. Actors
in a CMP enforcement action bear the
burden of proof for affirmative defenses
and mitigating circumstances by a
preponderance of the evidence. 42 CFR
1005.15(b)(1).
How an actor meets that burden may
depend, in part, on records or
documentation they maintain. For
example, a party may choose to
maintain documents demonstrating they
meet a specific exception in the
information blocking regulations in 45
CFR part 171.
Furthermore, the ONC Final Rule did
not establish record retention
requirements for actors to maintain
documents relating to an exception for
a specified period of time. Although
ONC did not set record retention
duration requirements, ONC explained
that many exceptions with
documentation conditions are related to
other existing regulatory requirements
that have document retention standards.
For example, the Security Exception at
45 CFR 171.203 is closely aligned to the
HIPAA Security Rule, which has a sixyear documentation retention
requirement in 45 CFR 164.316. 85 FR
25819, May 1, 2020.
We also note that the ONC Final Rule
established records and information
retention requirements for health IT
developers of certified health IT as part
of the ONC Health IT Certification
Program. The Maintenance of
Certification requirement at 45 CFR
170.402(b) generally requires a health IT
developer participating in the ONC
Health IT Certification Program to retain
all records and information necessary to
demonstrate initial and ongoing
compliance with the requirements of the
ONC Health IT Certification Program for
a period of 10 years beginning from the
date of certification.
2. Effective Date
We proposed two alternative effective
dates for the CMP for information
blocking. The first proposal proposed an
effective date of 60 days from the date
of the publication of the final rule. OIG
recognized that information blocking is
newly regulated conduct and that
individuals and entities would require
time to take steps to achieve compliance
with the ONC Final Rule. The second
E:\FR\FM\03JYR2.SGM
03JYR2
lotter on DSK11XQN23PROD with RULES2
Federal Register / Vol. 88, No. 126 / Monday, July 3, 2023 / Rules and Regulations
proposal proposed that we would set a
specific date when OIG’s CMP
regulations would become effective. OIG
specifically proposed an effective date
of October 1, 2020, but also noted that
we were considering effective dates
sooner or later than October 1, 2020.
Most of the comments submitted in
response to the proposed rule expressed
a preference for one of the two proposed
approaches. Commenters preferred
having a date certain, but no specific
effective date was the clear preferred
approach by a majority of those who
preferred a date certain. Commenters
also made several recommendations for
alternative approaches.
We are finalizing an effective date for
the CMP for information blocking of
September 1, 2023.
Comment: Most commenters
suggested that OIG adopt a date certain
and specifically align the effective date
of its CMP for information blocking with
the effective dates for the ONC Final
Rule and the CMS Interoperability and
Patient Access Final Rule (CMS Final
Rule) (85 FR 25510, May 1, 2020). Some
commenters stated that having a single
effective date/enforcement date for all
three rules would be beneficial for
preparing for compliance with these
rules. Some proposed specific,
alternative effective dates to allow
individuals and entities time to come
into compliance. Others did not propose
specific effective dates, but proposed an
extended period of time between the
publication of the final rule and the start
of enforcement to permit additional
time for ONC to issue additional
guidance, for ONC to provide education
and outreach, and for OIG to take into
consideration the PHE. Some believed
that enforcement should begin 3 months
after publication of OIG’s final rule
while several commenters believed the
appropriate amount of time was 6
months after publication of this rule. A
few commenters suggested that the
appropriate amount of time was 1 year
or 2 years after publication of this rule.
Some commenters supported the
proposal for an effective date of the
CMP for information blocking to be 60
days after publication of the final rule.
The commenters who supported this
proposal believed that 60 days after
publication provided sufficient time for
actors to review and respond to any
items that OIG was to outline in its final
rule and provide sufficient flexibility
and assistance to actors seeking to
comply.
Response: Having considered the
comments, we are finalizing our
proposal for an effective date for the
CMP for information blocking at 42 CFR
1003.1400, 1003.1410, and 1003.420 as
VerDate Sep<11>2014
17:49 Jun 30, 2023
Jkt 259001
September 1, 2023. We believe this
effective date responds to requests for
such a delay. It also addresses
commenters’ concerns about having
time to obtain additional guidance and
come into compliance, particularly
given the amount of time between the
publication of the proposed rule and
this final rule. In addition, the selection
of this effective date aligns with the
goals stated in the proposed rule of
providing individuals and entities
sufficient time to finalize their ongoing
efforts to comply with the ONC
information blocking regulations and
putting the industry on notice of when
penalties will apply to information
blocking conduct. This effective date is
consistent with the requests of
commenters who supported a date
certain because those commenters
largely sought a specific date to have
additional time for compliance efforts.
This effective date achieves that goal
based on the time between the proposed
rule and this rule, which is longer than
most specific dates proposed by
commenters.
As commenters shared with us in
responses to the proposed rule, the PHE
has significantly affected the United
States, patients, health care providers,
and the many individuals and entities
that support health care operations.
Actors that could be subject to the CMP
for information blocking have been
responding to COVID–19 on many
fronts including addressing information
technology-related requirements related
to COVID–19, such as reporting data to
multiple government agencies. All of
this has increased demands on health IT
developers of certified health IT, HIEs,
and HINs. Recognizing these
unprecedented circumstances, the
effective date for the CMP for
information blocking is reasonable and
aligns with the goals stated in the
proposed rule. Furthermore, OIG will
not impose a CMP on information
blocking conduct occurring before the
effective date of this final rule.
We reiterate that the effective date of
the CMP for information blocking only
applies to those actors defined at 45
CFR 171.102 as health IT developers of
certified health IT, HINs, and HIEs. We
note that the CMP for information
blocking does not apply to health care
providers except to the extent such
health care providers meet the
definition of a health IT developer of
certified health IT or an HIN/HIE. We
discuss in section IV.A.3 of the
preamble of this final rule how we
evaluate whether health care providers
may meet the health IT developer of
certified health IT or an HIN/HIE.
PO 00000
Frm 00009
Fmt 4701
Sfmt 4700
42827
3. Basis for Civil Money Penalties for
Information Blocking
OIG proposed a basis for the CMP for
information blocking at 42 CFR
1003.1400. In setting forth the basis for
the CMP in the proposed rule, we
proposed that we may impose a CMP
against any individual or entity as
defined in 45 CFR 171.103(b) that
commits information blocking, as
defined in 45 CFR part 171. We also
proposed that OIG’s enforcement would
rely on the regulatory definitions set
forth by ONC in the ONC Final Rule.
Commenters agreed with OIG’s
proposed approach but requested
clarification as to how OIG would
interpret the definitions set forth in 45
CFR 171.103(a)(2).
We note that since the publication of
the proposed rule, ONC has published
the ONC interim final rule (IFR) (85 FR
70064, November 4, 2020) that clarified
that 45 CFR 171.103(a)(2) refers to
health IT developers of certified health
IT rather than health information
technology developers.
In this final rule, we finalize 42 CFR
1003.1400 as proposed with a technical
correction that incorporates 45 CFR
171.103(a)(2) instead of 45 CFR
171.103(b) and a slight language change
to reflect our intent.
Comment: One commenter noted that
the regulatory text of our proposed
§ 1003.1400 should have cited 45 CFR
171.103(a)(2) instead of § 171.103(b)
when referring to those individuals or
entities subject to civil money penalties.
Response: We agree with the
commenter that the correct citation is 45
CFR 171.103(a)(2) and are making this
technical correction at 42 CFR
1003.1400. Our intent, as expressed in
the proposed rule, was to incorporate
ONC’s definition of ‘‘information
blocking,’’ which matches the statutory
language in section 3022(a)(1) of the
PHSA. This final rule corrects the
technical citation error in the proposed
rule and is not a substantive change.
We further note that we have changed
the language ‘‘as defined in’’ to ‘‘as set
forth in’’ consistent with our intent to
incorporate ONC’s information blocking
regulations in 45 CFR part 171. The
regulation at 45 CFR part 171 includes
general provisions, including
definitions, relevant to the information
blocking regulations, as well as the
‘‘exceptions’’ to the definition of
information blocking. We believe this
language change from ‘‘as defined in’’ to
‘‘as set forth in’’ better reflects our intent
to incorporate all of ONC’s information
blocking regulations into the OIG CMP
regulations.
E:\FR\FM\03JYR2.SGM
03JYR2
lotter on DSK11XQN23PROD with RULES2
42828
Federal Register / Vol. 88, No. 126 / Monday, July 3, 2023 / Rules and Regulations
Comment: Commenters requested
clarification as to whether they meet the
definition of HIN/HIE. Some
commenters requested clarification on
whether they would meet the definition
of HIN/HIE under specific facts, such as
by using ONC-certified application
programming interface (API) technology
as a health care provider, or by engaging
in specific processes as a health plan.
Some commenters requested
clarification as to whether certain types
of entities met the definition of HIN/
HIE, specifically asking whether a
public health institution combating
COVID–19, clinical data registries,
public health agencies, or a health plan
would ever be considered an HIN/HIE.
Other commenters requested
clarification and examples of when a
health care provider would meet the
definition of HIN/HIE and be subject to
CMPs rather than disincentives. Some
commenters suggested that a health care
provider or payer should never be
considered an HIN/HIE for purposes of
the final rule.
Response: OIG will use the definitions
in ONC regulations at 45 CFR 171.102
and any guidance issued by ONC when
evaluating whether an individual or
entity meets the definition of HIN/HIE.
Such determinations are individualized
and highly dependent on the facts and
circumstances presented. Because the
ONC definition of HIE/HIN is a
functional definition that does not
specifically include or exclude any
particular individuals or entities, OIG
cannot establish in this final rule
whether specific individuals or entities
or categories of individuals or entities
would meet the definition of HIN/HIE as
some commenters requested. OIG
investigations of information blocking
will include gathering facts necessary to
assess whether a specific individual or
entity meets a definition of health IT
developer of certified health IT or HIE/
HIN. Furthermore, we proposed
following the definitions promulgated
in the ONC Final Rule, which are now
found at 45 CFR 171.102, and which do
not exempt specific types of individuals
or entities from the definition of an
HIN/HIE that could commit information
blocking. Accordingly, we decline to
exempt specific types of individuals or
entities, including providers or payers,
in this final rule.
The ONC regulations define an HIN/
HIE as an individual or entity that
determines, controls, or has the
discretion to administer any
requirement, policy, or agreement that
permits, enables, or requires the use of
any technology or services for access,
exchange, or use of EHI: (1) among more
than two unaffiliated individuals or
VerDate Sep<11>2014
17:49 Jun 30, 2023
Jkt 259001
entities (other than the individual or
entity to which this definition might
apply) that are enabled to exchange with
each other; and (2) that is for a
treatment, payment, or health care
operations purpose, as such terms are
defined in 45 CFR 164.501 regardless of
whether such individuals or entities are
subject to the requirements of 45 CFR
parts 160 and 164. 45 CFR 171.102.
When determining whether an
individual or entity meets the definition
of an HIN/HIE, we may consult with
ONC.
In making a fact-specific assessment
of whether an individual or entity meets
the definition of an HIN/HIE in 45 CFR
171.102, we would assess whether the
individual or entity determines,
controls, or has the discretion to
administer any requirement, policy, or
agreement that permits, enables, or
requires the use of any technology or
services for access, exchange, or use of
EHI among two or more unaffiliated
entities (other than the individual or
entity that is the subject of the
allegation) that are enabled to exchange
with each other for a treatment,
payment, or health care operations
purpose as such terms are defined in 45
CFR 164.501. As stated in the ONC
Final Rule, the definition of HIN/HIE in
45 CFR 171.102 does not cover bilateral
exchanges in which an intermediary is
simply performing a service on behalf of
one entity in providing EHI to another
entity or multiple entities and no actual
exchange is taking place among all
entities. 85 FR 25802, May 1, 2020. The
ONC Final Rule also states that for the
two unaffiliated individuals or entities
besides the HIE/HIN to be enabled, the
parties must have the ability and the
discretion to exchange with each other
under the policies, agreements,
technology, and/or services. 85 FR
25802, May 1, 2020. Based on the ONC
Final Rule and depending on the
specific facts and circumstances, public
health institutions, clinical data
registries, public health agencies, health
plans, and health care providers could
meet the definition of an HIN/HIE. As
part of our assessment of whether a
health care provider or other entity is an
HIN/HIE that could be subject to CMPs
for information blocking, OIG
anticipates engaging with the health
care provider or other entity to better
understand its functions and to offer the
provider an opportunity to explain why
it is not an HIN/HIE. We note further
that should the definitions in 45 CFR
part 171 change in the future, we would
continue to look to applicable
definitions in 45 CFR part 171 when
determining whether an individual or
PO 00000
Frm 00010
Fmt 4701
Sfmt 4700
entity was an HIN/HIE at the time of the
conduct.
Comment: One commenter noted that
the definition of HIN/HIE could apply to
individuals serving on HIN governance
and advisory committees and requested
clarification about whether OIG would
direct enforcement against an individual
serving on an advisory board for an
entity that qualifies as an HIN. The
commenter noted that HIEs and HINs
rely upon their governance and advisory
committees and that individuals subject
to enforcement may not want to provide
their perspectives or participate on
these committees.
Response: While we believe it is
unlikely that an individual serving on
an HIN/HIE governance and advisory
committee would be subject to
information blocking enforcement, such
individuals could be subject to
enforcement if, based on the specific
facts, they meet the definition of HIN/
HIE and have engaged in information
blocking with the requisite intent. To
provide transparency on how OIG
would assess an allegation involving an
individual described by the commenter,
we provide the following explanation.
Consistent with section 3022(b)(2)(A)
of the PHSA, individuals or entities
subject to the CMP for information
blocking must fall within a definition in
45 CFR 171.102 that describes one of the
categories of actors that are subject to
the CMP under section 3022(b)(2)(A)
(i.e., developers, networks and
exchanges). First, we emphasize that to
determine whether an individual on an
advisory board met the definition of an
HIN/HIE, we would assess the specific
facts and circumstances in the case. In
assessing whether an individual met the
definition of HIN/HIE, OIG would
consider the advisory board’s purpose
and authority to determine, control, or
have discretion to administer any
requirement policy, or agreement. OIG
would also consider the individual’s
role, the individual’s authority, and
whether the individual determines,
controls, or has the discretion to
administer any requirement, policy, or
agreement as a member of the advisory
board. An individual or entity that does
not determine, administer, or have
discretion to administer a policy,
requirement, or agreement would not
meet the definition of an HIN/HIE. For
example, the mere act of serving on an
advisory board would not mean an
individual is an HIN/HIE.
Second, to impose CMPs against an
individual, OIG would have to
demonstrate that the individual
committed an act of information
blocking, which includes a requisite
intent. Assuming the individual on the
E:\FR\FM\03JYR2.SGM
03JYR2
lotter on DSK11XQN23PROD with RULES2
Federal Register / Vol. 88, No. 126 / Monday, July 3, 2023 / Rules and Regulations
advisory board met the definition of an
HIN/HIE, OIG would examine whether
the individual engaged in a practice that
constituted information blocking. We
would analyze the specific practice
engaged in by the individual to
determine CMP liability. This is
consistent with section 3022(a)(6) of the
PHSA, which states that information
blocking with respect to an individual
or entity shall not include an act or
practice other than an act or practice
committed by such individual or entity.
Also consistent with the statute and the
implementing regulations in 45 CFR
171.103(a)(2), we would determine
whether the individual knew or should
have known that the practice in which
the individual engaged was likely to
interfere with the access, exchange, or
use of EHI.
OIG maintains discretion in
evaluating what claims to investigate
and when to impose CMPs. OIG is not
required to—and does not expect to be
able to—investigate every allegation it
receives. Similarly, OIG may decide it is
appropriate to impose CMPs on an
entity but not on both an entity and an
individual for the same conduct.
Comment: One commenter requested
guidance on whether a health care
provider would ever be viewed as a
health IT developer of certified health
IT. The commenter specifically asked
whether a health care provider that
sublicensed certified health IT to an
unaffiliated provider could be subject to
CMPs.
Response: A health care provider may
meet the definition of a health IT
developer of certified health IT in
§ 171.102, depending on the specific
facts and circumstances. This regulatory
definition excludes from its scope a
health care provider that self-develops
health IT for its own use. If any other
individual or entity, including a health
care provider, develops or offers one or
more health IT modules certified under
the ONC Health IT Certification
Program, then they may meet the
definition of health IT developer of
certified health IT. If an individual or
entity meets the definition of health IT
developer of certified health IT and
engages in conduct constituting
information blocking, then that
individual or entity could be subject to
CMPs.
Regarding the commenter’s specific
question, section 3022(b)(1)(A) of the
PHSA authorizes OIG to investigate
claims of information blocking against
any ‘‘other entity offering certified
health information technology,’’ and the
definition of a health IT developer of
certified health IT at 45 CFR 171.102
includes an individual or entity that
VerDate Sep<11>2014
17:49 Jun 30, 2023
Jkt 259001
‘‘offers health information technology.’’
ONC further clarified in the ONC Final
Rule its policy goal to hold all entities
that could, as a developer or offeror,
engage in information blocking
accountable for their practices that are
within the definition of information
blocking in 45 CFR 171.103. ONC
expressly considered comments to
exclude from the definition those
entities that only offer technology,
rather than modify, configure, or
develop it, and declined to do so. 85 FR
25798–99, May 1, 2020. OIG would
assess whether a provider that
sublicenses technology to an
unaffiliated entity meets the definition
of a health IT developer of certified
health IT at 45 CFR 171.102 based on
the specific facts and circumstances.
ONC specifically exempted health
care providers that self-develop health
IT for their own use from the definition
of ‘‘health IT developer of certified
health IT.’’ The ONC Final Rule clarifies
that health care providers that selfdevelop health IT for their own use
refers to health care providers that are
the primary users of the health IT and
are responsible for its certification
status. 85 FR 25799, May 1, 2020. The
ONC Final Rule states that ONC
interprets ‘‘a health care provider that
self-develops health IT for its own use’’
to mean that a health care provider does
not offer the self-developed health IT to
other entities on a commercial basis or
otherwise. 85 FR 25799, May 1, 2020.
The ONC Final Rule clarifies that a selfdeveloper is not an offeror if it issues
login credentials to a licensed health
care professional in an independent
practice that allow the use of a
hospital’s electronic health records
(EHRs) to furnish and document care to
patients in the hospital. 85 FR 25799,
May 1, 2020. Whether an individual or
entity ‘‘offers health information
technology’’ requires a fact-specific
inquiry, and we expect to consult with
ONC in determining whether an
individual or entity meets this
definition.
As part of any investigation, OIG will
need to evaluate whether an individual
or entity meets the definition of health
IT developer of certified health IT or
health information exchange or
network. If OIG determines this
definition is met and conduct meets the
definition of information blocking, OIG
may impose CMPs.
Comment: One commenter asked
whether a parent company could be
subject to CMPs for information
blocking based on the conduct of a
subsidiary.
Response: Whether information
blocking on the part of a subsidiary is
PO 00000
Frm 00011
Fmt 4701
Sfmt 4700
42829
attributable to the parent entity depends
on the specific facts and circumstances.
Specifically, if a subsidiary acts as the
agent of the parent, the parent may be
subject to CMPs for the act of the
subsidiary if the subsidiary commits
information blocking within the scope
of agency. Section 3022(b)(2)(C) of the
PHSA states that the provisions of
section 1128A of the SSA shall apply to
a CMP for information blocking. Section
1128A(l) of the SSA states that a
principal is liable for penalties,
assessments, and exclusion for the acts
of the principal’s agent acting within the
scope of agency.
There may be other instances when
information blocking by a subsidiary
may create CMP liability for the parent.
We note that nothing in the statute or
ONC Final Rule precludes such liability,
and the ONC Final Rule provides that a
health IT developer of certified health
IT includes not only the entity that is
legally responsible for the certification
status of the health IT but could also
include any subsidiaries or successors,
depending on the specific facts and
circumstances of a particular case. 85
FR 25800, May 1, 2020. At this time, we
do not have sufficient experience or
evidence to delineate specific
circumstances where a parent might be
liable for information blocking by its
subsidiary. We would make any
determinations based on the specific
facts and circumstances presented.
Comment: One commenter believed
that EHR vendors may limit the access
of third-party vendors to data, data
stores, databases, and endpoints that
store data that are not part of the United
States Core Data for Interoperability
(USCDI).1 Specifically, the commenter
was concerned that an EHR vendor may
grant a health care provider access to a
database and then deny a third-party
vendor the same access. The commenter
suggested OIG monitor and penalize
EHR vendors that restrict access to data
not represented in the USCDI.
Response: Whether a practice
constitutes information blocking
depends on the specific facts and
circumstances. First, the practice must
involve EHI as defined in ONC’s
information blocking regulations. On
and after October 6, 2022, EHI for
purposes of the information blocking
definition in 45 CFR 171.103(a) is not
limited to the information identified by
data elements represented in the USCDI
standard adopted in 45 CFR 170.213,
and practices that interfere with access,
1 USCDI is a standardized set of health data
classes and constituent data elements for
nationwide, interoperable health information
exchange.
E:\FR\FM\03JYR2.SGM
03JYR2
lotter on DSK11XQN23PROD with RULES2
42830
Federal Register / Vol. 88, No. 126 / Monday, July 3, 2023 / Rules and Regulations
exchange, or use of any information
falling within the definition of EHI in 45
CFR 171.102 may constitute information
blocking.
However, even after October 6, 2022,
the definition of EHI still excludes
certain types of data that an actor may
have. For example, EHI does not include
psychotherapy notes as defined in 45
CFR 164.501. Therefore, the specific
facts and circumstances will determine
whether the data that is the subject of
a claim of information blocking
constitutes EHI.
Second, the practice must constitute
information blocking and the individual
or entity must have had the requisite
intent. We will assess whether the
practice is likely to interfere with the
access, exchange, or use of EHI, and
whether the practice was required by
law or met one of the information
blocking exceptions. For example, in
assessing an allegation similar to the
commenter’s fact pattern, we may assess
whether the health IT developer of
certified health IT provided the EHI to
the health care provider and the thirdparty vendor using an alternative
manner specified by the third-party
vendor consistent with the Content &
Manner Exception in 45 CFR 171.301.
Comment: One commenter
encouraged OIG to impose CMPs for
information blocking on health IT
developers of certified health IT with
transfer of liability provisions in their
contracts. The commenter noted that
small and mid-size organizational
health care providers are often
presented with service contracts that
have undesirable terms on a ‘‘take it or
leave it’’ basis because they may have
only one health IT developer available
or lack the market share (i.e., leverage)
necessary to negotiate out of the
undesirable terms.
Response: OIG’s information blocking
regulations establish the basis for
imposing CMPs for information
blocking, which is whether the conduct
constitutes information blocking as
defined in 45 CFR 171.103. The ONC
Final Rule established that a variety of
contractual provisions could interfere
with the access, exchange, and use of
EHI and thus implicate the information
blocking provision. For example, ONC
explained that a contract may implicate
the information blocking provision if it
includes unconscionable terms for the
access, exchange, or use of EHI, or
licensing of an interoperability element
that could include, but is not limited to,
agreeing to indemnify the actor for acts
beyond standard practice, such as gross
negligence on the part of the actor. ONC
explained further that such terms may
be problematic with regard to
VerDate Sep<11>2014
17:49 Jun 30, 2023
Jkt 259001
information blocking in situations
involving unequal bargaining power
relating to accessing, exchanging, and
using EHI. 85 FR 25812, May 1, 2020.
We will consult with ONC as necessary
to inform our determinations as to
whether specific service contracts,
provisions, and related practices that
transfer liability implicate the
information blocking provision.
Comment: One commenter stated that
the CMS Final Rule requires State
Medicaid agencies to make claims with
a service date on or after January 1,
2016, available to a beneficiary or a
beneficiary’s personal representative.
But the rule did not specify how long
these claims had to be made available.
The commenter asked whether the
purging of those claims would subject
State Medicaid agencies to information
blocking penalties.
Response: OIG does not intend to use
its authority to investigate information
blocking under section 3022(b)(1) of the
PHSA to investigate compliance under
CMS program requirements. If an
investigation uncovers conduct that
suggests non-compliance with CMS
program requirements, OIG may refer
such matters to CMS.
4. Definition of Violation
OIG proposed that a violation be
defined as a practice, as defined at 45
CFR 171.102, that constitutes
information blocking, as defined at 45
CFR part 171. We have finalized the
definition of violation as proposed with
a slight modification at 42 CFR
1003.1410(a).
Comment: Many commenters
expressed support for our proposed
definition of ‘‘violation’’ and the
incorporation of ONC’s definition of
‘‘practice.’’ Commenters requested that
we provide additional clarity and
guidance as to the distinction between
a single violation and multiple
violations. Other commenters stated that
we should provide more specific criteria
for identifying a single violation as
opposed to multiple violations. Some
commenters requested additional clarity
as to whether a practice involving
multiple patient records would
constitute multiple violations.
Response: As finalized in this rule, a
violation is a practice, as defined in 45
CFR 171.102, that constitutes
information blocking, as set forth in 45
CFR part 171. We note that we have
changed the language from ‘‘as defined
in’’ to ‘‘as set forth in,’’ consistent with
our intent to incorporate all of ONC’s
regulations. Whether a practice
constitutes a violation depends on the
specific facts and circumstances. We did
not propose, and therefore this rule does
PO 00000
Frm 00012
Fmt 4701
Sfmt 4700
not finalize, specific criteria that we
would use to identify single or multiple
violations because we do not have
enough information or experience with
information blocking enforcement to
allow us to establish a set of criteria that
could apply uniformly to all
information blocking allegations. As we
gain more experience in assessing
allegations, conducting information
blocking investigations, and imposing
CMPs, we may identify patterns or data
that allow us to develop guidance with
more specific criteria.
In response to commenters’ requests,
we are providing below hypothetical
examples illustrating how we would
determine whether information blocking
practices constitute single or multiple
violations. The examples set out in the
proposed rule at 85 FR 22986–87 remain
applicable. But, we clarify that the
examples provided in the proposed rule
should be understood as involving
health IT developers of certified health
IT, since health IT developers that do
not meet the regulatory definition of
health IT developers of certified health
IT would not be subject to CMPs. We
emphasize that the examples in this
preamble and in the preamble to the
proposed rule are illustrative, factdependent, and not exhaustive. We
further note that while our examples
discuss the use of health information
technology certified under the ONC
Certification Program, an individual or
entity that meets the definition of a
health IT developer of certified health
IT or HIE/HIN may engage in conduct
that constitutes information blocking
relating to health IT certified under the
ONC Certification Program, health IT
not certified under the ONC
Certification Program, or a combination
of both.
The following hypothetical examples
of conduct assume that the facts meet all
the elements of the information blocking
definition—including the requisite level
of statutory intent.
• A health IT developer (D1) connects
to an API supplied by health IT
developer of certified health IT (D2).
D2’s API has been certified to 45 CFR
170.315(g)(10) (standardized API for
patient and population services) of the
ONC Certification Program and is
subject to the ONC Condition of
Certification requirements at 45 CFR
170.404 (certified API technology). A
health care provider using D1’s health
IT makes a single request to receive EHI
for a single patient via D2’s certified API
technology. D2 denies this request. OIG
would consider this a single violation
by D2 affecting a single patient. The
violation would consist of D2’s denial of
E:\FR\FM\03JYR2.SGM
03JYR2
lotter on DSK11XQN23PROD with RULES2
Federal Register / Vol. 88, No. 126 / Monday, July 3, 2023 / Rules and Regulations
the request to exchange EHI to the
provider through D2’s certified API.
• A health care provider using
technology from a health IT developer
(D1) makes a single request to receive
EHI for 10 patients through the certified
API technology of a health IT developer
of health IT (D2). D2 takes a single
action to prevent the provider from
receiving any patients’ information via
the API. OIG would consider this as a
single violation affecting multiple
patients. This is a single violation as D2
took a single action to deny all requests
from the provider. The number of
patients affected by the violation would
be considered when determining the
amount of the CMP.
• A health care provider using health
IT supplied by a health IT developer
(D1) makes multiple, separate requests
to receive EHI for several patients via
certified API technology supplied by a
health IT developer of certified health
IT (D2). Each request is for EHI for one
or more patients. D2 denies each
individual request but does not set up
the system to deny all requests made by
the health care provider through D2’s
certified API technology. Thus, D2 is
taking separate actions to block
individual requests. OIG would
consider this conduct to consist of
multiple violations affecting multiple
patient records. Each denial would be
considered a separate violation. The
number of patients affected by each
violation would be considered in
determining the amount of the penalty
per violation. We note that for purposes
of this example, each denial by D2
constitutes a separate act and thus a
separate violation. Thus, if the health
care provider using D1’s health IT made
one request for one patient’s EHI, a
second request for three patients’ EHI,
and a third request for five patients’
EHI, there would be three separate
violations but the penalties may vary
due to the number of patients affected
by each violation. The action or actions
taken by D2 in response to the health
care provider’s requests provide the
basis for assessing whether a practice
constitutes a single or multiple
violations.
• A health care provider using health
IT supplied by a health IT developer
(D1) makes multiple requests to receive
EHI for a single patient via certified API
technology supplied by a health IT
developer of certified health IT (D2). But
D2 has updated its system to deny all
requests made by anyone using D1’s
technology. Thus, none of the requests
by the provider using D1’s health IT
result in the provider receiving any EHI
and D2 always denies requests based on
the system change. OIG would consider
VerDate Sep<11>2014
17:49 Jun 30, 2023
Jkt 259001
this practice a single violation. The
violation in this case is the singular
action to update the system to always
deny EHI to anyone requesting to
receive the EHI via D1 or D1’s health IT.
The result of this violation is that all of
the requests are denied; however, each
individual denial does not constitute a
violation. The number of patients
affected by D2’s denial may constitute
an aggravating circumstance resulting in
an increased penalty.
• A health IT developer of certified
health IT enters into a software license
agreement with a health care provider
that requires that the health care
provider pay a fee for the express
purpose of permitting the health care
provider to export patients’ EHI via the
capability certified according to 45 CFR
170.315(b)(10) for switching health IT
systems. When the health care provider
requests the electronic export, the
health IT developer of certified health
IT charges the health care provider the
fee. We note that the Fees Exception in
45 CFR 171.302 excludes fees charged
for an export using functionality
certified according to 45 CFR
170.315(b)(10) for purposes of switching
health IT. OIG would consider this
conduct to include two violations. The
first violation would be inclusion of the
contract provision (fee) that is likely to
interfere with, prevent, or materially
discourage access, exchange, or use of
EHI. The second violation would be
charging the health care provider the
fee. Charging the fee in this case
constitutes a separate action, and
therefore a separate violation from the
inclusion of the fee in the software
license agreement.
We emphasize that information
blocking only requires engaging in a
practice that is likely to interfere with,
prohibit, or materially discourage the
access, exchange, or use of EHI.
Information blocking does not require
that the practice actually interferes with,
prohibits, or materially discourages the
access, exchange, or use of EHI.
Comment: One commenter expressed
concern that the example in the
proposed rule concerning the health IT
developer vetting a third-party
application might cause health IT
developers to forgo necessary security
and privacy vetting of applications due
to fear of potentially committing an
information blocking violation.
Response: In the preamble to the
proposed rule, we provided an example
where a health IT developer requires
vetting of third-party applications before
the applications can access the health IT
developer’s product, but the health IT
developer denies applications based on
the functionality of the application and
PO 00000
Frm 00013
Fmt 4701
Sfmt 4700
42831
not for a privacy or security concern. 85
FR 22987. We note that the ONC Final
Rule contained a discussion of vetting,
and we agree with the commenter that
our example in the preamble to the
proposed rule at 85 FR 22987 could
benefit from additional explanation.
Before clarifying our example, we
provide some of the discussion of
‘‘vetting’’ from the ONC Final Rule.
First, we note that ‘‘vetting’’ in this
context is intended to mean a
determination regarding whether the
application posed a security risk to the
health IT developer of certified health
IT’s software. Second, pursuant to the
ONC Final Rule, a vetting process
applied in a discriminatory or
unreasonable manner could implicate
the information blocking provision. 85
FR 25814–17, May 1, 2020. Third, the
ONC Final Rule states that for certified
API technology (e.g., a Health IT
Module certified to § 170.315(g)(10),
which includes the use of OAuth2
among other security requirements (see,
e.g., 85 FR 25741) in addition to its
focus on ‘‘read-only’’/responses to
requests for EHI to be transmitted, there
should be few, if any, security concerns
about the risks posed by patient-facing
apps to the disclosing actor’s health IT
systems (because the apps would only
be permitted to receive EHI at the
patient’s decision). Thus, for third-party
applications chosen by individuals to
facilitate their access to their EHI held
by actors, there would generally not be
a need for ‘‘vetting’’ on security grounds
and such vetting actions would be an
interference. 85 FR 25815, May 1, 2020.
Fourth, actors, such as health care
providers, have the ability to conduct
whatever ‘‘vetting’’ they deem necessary
of entities (e.g., app developers) that
would be their business associates
under HIPAA before granting access and
use of EHI to the entities. In this regard,
covered entities must conduct necessary
vetting in order to comply with the
HIPAA Security Rule. 85 FR 25815, May
1, 2020.
With this in mind, we clarify the
example as follows. A health IT
developer of certified health IT requires
vetting of third-party applications to
determine whether the applications
pose a security risk before the
applications are permitted to interface
or integrate with the health IT developer
of certified health IT’s product, which
contains EHI. The health IT developer of
certified health IT does not apply this
vetting process to third party
applications selected and authorized by
a patient or provider to receive EHI from
‘‘certified API technology,’’ as defined
as 45 CFR 170.404(c). The health IT
developer of certified health IT does not
E:\FR\FM\03JYR2.SGM
03JYR2
lotter on DSK11XQN23PROD with RULES2
42832
Federal Register / Vol. 88, No. 126 / Monday, July 3, 2023 / Rules and Regulations
apply this vetting to patients or API
Information Sources, as defined at 45
CFR 170.404(c), which are only
receiving EHI through a standardized
API. And, the health IT developer of
certified health IT does not engage the
third-party applications as a business
associate or business associate
subcontractor. The health IT developer
of certified health IT uses vetting to
deny EHI access to third-party
applications that compete with one of
the developer’s applications. The health
IT developer of certified health IT then
denies third-party applications solely on
the basis that they compete with one of
the developer’s applications. Each
denial based on the competitive nature
of the third-party application is
considered a separate violation, as it is
a separate act or omission.
If an actor, such as a health IT
developer of certified health IT,
identifies specific security risks posed
by a third-party application, the actor
may address those risks consistent with
the Security Exception at 45 CFR
171.203 to ensure its practices are not
considered information blocking.
Comment: One commenter requested
that OIG consider compliance with
privacy and security standards as an
important factor when evaluating what
constitutes a violation.
Response: Both section 3022(a)(1)(A)
of PHSA and 45 CFR 171.103(a)(1)
exempt from the definition of
information blocking practices required
by law. Therefore, if a practice is
required by privacy or security laws, it
does not constitute information
blocking. 85 FR 25846, May 1, 2020.
However, privacy and security
standards that are not required by law
(such as trade best practices or
voluntary industry standards) would not
be exempt from the definition of
information blocking, unless an
exception applies. When investigating
an allegation, we may coordinate with
other agencies to understand whether
the practice was required under
applicable privacy and security laws.
Additionally, ONC established
separate Privacy and Security
Exceptions at 45 CFR 171.202 and
171.203. If a practice meets all
conditions of an exception at all
relevant times, then the practice would
not be considered information blocking.
When investigating an allegation, OIG
will assess whether a practice meets an
exception.
Comment: Several commenters
requested that OIG clarify its view on
when the enactment of a policy
constitutes information blocking.
Commenters requested clarity on
whether OIG would view the enactment
VerDate Sep<11>2014
17:49 Jun 30, 2023
Jkt 259001
of a policy that constitutes information
blocking as a single violation or
multiple violations. Some commenters
suggested that consistent and repetitive
implementation of a policy should be
considered a single violation, regardless
of the number of times the policy was
applied. Another commenter suggested
that we should approach violations and
penalties as OCR did in its HIPAA
Administrative Simplification
Enforcement Final Rule, 71 FR 8390,
February 16, 2006, specifically that we
should consider a pattern or practice of
information blocking to be more
violations than a single instance
emanating from the same conduct or
type of conduct.
Response: We will treat the enactment
of a policy that is likely to interfere
with, prevent, or materially discourage
as one violation. But each enforcement
of the policy will constitute another,
separate violation. If the creation or
existence of the policy alone is what
determined the number of violations,
and not the number of times the policy
was enforced, large organizations with
many customers or significant market
share would be able to enact policies—
regardless of whether they have been
written or formalized—and engage in
nationwide conduct constituting
information blocking against multiple
individuals or entities knowing that the
maximum penalty would be the
statutory maximum of $1 million. A
practice is defined as an act or omission
by an actor. 45 CFR 171.102. Given that
our definition of violation incorporates
the word ‘‘practice’’ and expressly refers
to ONC’s definition of practice, the
number of violations is connected to the
number of discrete acts engaged in by
the actor and will depend on the
specific facts and circumstances.
5. Determinations Regarding the Penalty
Amounts
We proposed to add new 42 CFR
1003.1420 that would codify the
statutory factors that OIG must consider
when imposing CMPs for committing
information blocking. Section
3022(b)(2)(A) of the PHSA mandates
that in determining the amount of a
CMP for information blocking, OIG must
consider factors such as the nature and
extent of the information blocking and
the harm resulting from such
information blocking including, where
applicable, the number of patients
affected, the number of providers
affected, and the number of days the
information blocking persisted. The
proposed regulatory text included these
statutory factors. Given the novel nature
of information blocking investigations
and enforcement, we recognized in the
PO 00000
Frm 00014
Fmt 4701
Sfmt 4700
preamble to the proposed rule that we
have limited experience to inform the
proposal of additional aggravating and
mitigating circumstances to adjust the
CMP penalties. Thus, we proposed only
to implement the statutory factors
described above. We also solicited
comment on any additional factors that
we should consider for the final rule.
We received several comments on
proposed factors and a number of
recommendations to implement other
factors.
We are finalizing 42 CFR 1003.1420 as
proposed with a modification to the
regulatory text at 42 CFR 1003.1420(a),
which is the factor for ‘‘nature and
extent of the information blocking.’’ For
this factor, we have added to the
regulatory text the specific facts that
section 3022(b)(2)(A) of the PHSA
directs us to take into account where
applicable: the number of patients
affected (42 CFR 1003.1420(a)(1)),
number of providers affected (42 CFR
1003.1420(a)(2)), and the number of
days the information blocking persisted
(42 CFR 1003.1420(a)(3)). In the
preamble of the proposed rule, we
explained our intent was to specifically
implement the exact statutory factors in
section 3022(b)(2)(A). 85 FR 22987,
April 24, 2020.
Comment: Some commenters
requested that OIG consider additional
aggravating and mitigating factors when
determining the penalty amount it will
impose. Commenters suggested
considering characteristics of the actor,
including an actor’s size, market share,
whether the actor faced systemic
barriers to interoperability, whether the
actor took corrective action prior to
imposition of a penalty, and the actor’s
compliance, specifically the actor’s
history of compliance with the
information blocking rules, the
robustness of an actor’s compliance
program, and whether the actor made
good faith efforts to seek ONC/OIG
guidance. Some commenters suggested
considering the consequences of the
conduct, such as whether the
information blocking resulted in patient
harm and the severity of that harm, and
whether the information blocking
impacted another actor’s ability to
access information (i.e., interfered with
a provider’s ability to deliver patient
care). Some commenters suggested
looking at the specific conduct at issue,
specifically whether the information
blocking involved a single violation or
multiple violations, whether an actor
had specific intent to engage in
information blocking, whether the actor
had control and the extent of that
control over the EHI, and whether there
were contributory practices by others.
E:\FR\FM\03JYR2.SGM
03JYR2
lotter on DSK11XQN23PROD with RULES2
Federal Register / Vol. 88, No. 126 / Monday, July 3, 2023 / Rules and Regulations
Some commenters suggested that OIG
consider mitigating factors beyond an
actor’s control, such as the effects of
natural disasters and public health
emergencies (such as the PHE caused by
the COVID–19 pandemic) on health care
delivery and data exchange.
Furthermore, commenters also
suggested that practices that exacerbate
the negative impact of natural disasters
and public health emergencies be
considered an aggravating factor. Some
commenters suggested that OIG should
consider adopting factors based on
factors used by OCR in assessing HIPAA
CMPs. Some commenters recommended
that OIG consider instances of an actor
self-disclosing information blocking
conduct as a mitigating factor.
Response: We thank commenters for
the recommendations of additional
aggravating and mitigating factors that
OIG should consider. We may consider
implementing additional, specific
factors in the future via notice and
comment rulemaking as we gain more
experience in enforcing the CMP for
information blocking. At this time,
however, we are finalizing the statutory
factors listed in section 3022(b)(2)(A) of
the PHSA as we proposed, with the
modification to the proposed factor for
‘‘nature and extent of the information
blocking’’ described above.
While we are not adopting additional
aggravating and mitigating factors
specific to information blocking, we
observe that the existing, general factors
we must consider under the CMPL will
apply to the CMP for information
blocking and may address many of the
commenters’ concerns. The PHSA
requires that the provisions of section
1128A of the SSA (other than subsection
(a) and (b) of such section) apply to a
CMP for information blocking in the
same manner as such provisions apply
to a CMP or proceeding under section
1128A(a) of the Act. Section 1128A(d) of
the SSA requires that OIG, when
determining the amount or scope of any
assessment, penalty or exclusion
imposed under subsection (a), take into
account ‘‘(1) the nature of claims and
the circumstances under which they
were presented, (2) the degree of
culpability, history of prior offenses,
and financial condition of the person
presenting the claims, and (3) such
other matters as justice may require.’’ 42
U.S.C. 1320a–7a(d). These broad general
factors apply to the CMP for information
blocking set forth in the PHSA as they
do under section 1128A(a) of the SSA.
They encompass some of the mitigating
or aggravating factors recommended by
commenters.
The existing regulatory framework for
OIG’s CMPs requires that we apply the
VerDate Sep<11>2014
17:49 Jun 30, 2023
Jkt 259001
aggravating and mitigating factors in 42
CFR 1003.140 to the CMP for
information blocking determinations in
a manner consistent with section
1128A.
As we set forth in the OIG Medicare
and State Health Care Programs: Fraud
and Abuse Revisions to the Office of
Inspector General’s Civil Monetary
Penalty Rules Final Rule (Revisions
Rule), we consider the financial
condition of an actor after we evaluate
the facts and circumstances of conduct
and weigh aggravating and mitigating
factors to determine an appropriate
penalty and assessment amount. 81 FR
88334, December 7, 2016. Once OIG
proposes a penalty amount, the
individual or entity may request that
OIG consider its ability to pay the
proposed amount under procedures
discussed in the Revisions Rule at 81 FR
88338.
In addition to the general factors in
section 1128A, section 3022(b)(2)(A) of
the PHSA specifies a non-exhaustive list
of factors that we must consider when
imposing CMPs for information
blocking. In the proposed rule, we
proposed incorporating the PHSA’s
specific information blocking factors
into our existing regulations at new
§ 1003.1420 of title 42. This new section
complements the existing section at 42
CFR 1003.140.
We recognize that the statutory factors
enumerated in the PHSA may overlap
with the general statutory and
regulatory factors for all CMPs in
section 1128A of the SSA and in 42 CFR
1003.140. For example, we recognize
that ‘‘the nature and circumstances of
the violation,’’ 42 CFR 1003.140(a)(1), is
a similar factor to the ‘‘nature and extent
of the information blocking’’ and that,
consequently, there may be a fact
pattern that implicates both factors. We
would not apply both or ‘‘double count’’
these factors when determining the
penalty. We would make a holistic
consideration of all aggravating factors
when determining the amount of any
penalty; this approach would take into
account the similarity of the factors.
Many of the commenters’ suggested
factors, such as whether the information
blocking resulted in patient harm and
the severity of that harm, whether the
actor had specific intent to engage in
information blocking, and whether there
was one violation or multiple violations,
are already encapsulated by the general
factors in 42 CFR 1003.140 or the
specific information blocking factors in
42 CFR 1003.1410 finalized by this rule.
We provide the following examples to
illustrate how the issues raised by
commenters may be considered when
we assess penalty amounts using the
PO 00000
Frm 00015
Fmt 4701
Sfmt 4700
42833
two sets of factors at 42 CFR 1003.140
or 1003.1420.
For example, to assess the ‘‘nature
and circumstances’’ in 42 CFR 1003.140
and ‘‘nature and extent’’ of the
information blocking in 42 CFR
1003.1420, we will consider the factual
nature, circumstances, and extent of the
information blocking conduct.
Depending on the specific facts and
circumstances, these factors may
include whether the practice actually
interfered with the access, exchange, or
use of EHI; the number of violations;
whether an actor took corrective action;
whether an actor faced systemic barriers
to interoperability; to what extent the
actor had control over the EHI; the
actor’s size; and the market share.
Similarly, the general factor in 42 CFR
1003.140 relating to degree of
culpability would allow us to consider
the commenters’ suggested factors
relating to whether an actor had actual
knowledge or whether an actor had
specific intent to engage in information
blocking.
Additionally, to assess the ‘‘harm’’
factor in 42 CFR 1003.1420, we will
consider whether any harm—including
physical or financial harm—occurred
and evaluate the severity and extent of
the harm. In accordance with the
statutory language, we will consider the
number of patients affected, number of
providers affected, and the duration of
the information blocking conduct. We
recognize that the primary factors set
forth at § 1003.140 may also
contemplate harm. (For example, in the
Revisions Rule, we stated that our
consideration of the ‘‘nature and
circumstances’’ would include
’’whether patients were or could have
been harmed.’’ 81 FR 88337, December
7, 2016.)
With respect to consideration of selfdisclosure of information blocking
conduct, it is a mitigating circumstance
under the general factors at 42 CFR
1003.140(a)(2) for an actor to take
appropriate and timely corrective action
in response to a violation. Relevant
corrective action must include
disclosing the violation to OIG through
the SDP and fully cooperating with
OIG’s review and resolution of such
disclosure. As discussed in section III.C
of the preamble, OIG does not currently
have an SDP for information blocking
and plans on creating a specific SDP for
information blocking after publication
of this rule.
We are also not adding factors related
to the circumstances surrounding the
commission of the act, such as a factor
that evaluates whether there were
contributory practices by others or an
intervening natural disaster. In some
E:\FR\FM\03JYR2.SGM
03JYR2
lotter on DSK11XQN23PROD with RULES2
42834
Federal Register / Vol. 88, No. 126 / Monday, July 3, 2023 / Rules and Regulations
instances, these factors are subsumed in
existing general factors. Moreover,
section 3022(a)(6) of the PHSA states
that ‘‘information blocking, with respect
to an individual or entity, shall not
include an act or practice other than an
act or practice committed by such
individual or entity.’’ Information
blocking, as to health IT developers of
certified health IT, HIEs, and HINs, is a
practice that an actor ‘‘knows’’ or
‘‘should know’’ is likely to interfere
with, prevent, or materially discourage
the access, exchange, or use of EHI. For
example, in the circumstance of an
intervening natural disaster that
prevents an actor from responding to
requests for data, the actor may not have
the requisite level of intent. In such a
situation, it is unlikely that there would
be a sufficient basis to pursue CMPs for
information blocking against the actor,
and consideration of the factors relating
to determination of the amount of any
penalty would not be necessary.
Finally, we note that the modification
to 42 CFR 1003.1420(a) finalized in this
final rule adds three specific facts OIG
must consider where applicable
(number of patients affected, number of
providers, and number of days the
information blocking persisted). This
modification aligns the factors at
§ 1003.1420(a) more precisely with the
language of the PHSA. As we stated in
the proposed rule, section 3022(b)(2)(A)
of the PHSA mandates the consideration
of the nature and extent of the
information blocking and harm resulting
from such information blocking
including, where applicable, the
number of patients affected, the number
of providers affected, and the number of
days the information blocking persisted.
We intended the language of our
proposed rule to reflect these statutory
factors. 85 FR 22987, April 24, 2020.
These factors may also address several
of the commenters’ concerns related to
consideration of impact on patients and
providers.
Comment: Some commenters
suggested an additional mitigating factor
of whether an actor was acting in
accordance with another Federal law,
State law, or court order limiting or
prescribing certain behaviors.
Response: Section 3022(a)(1)(A) of the
PHSA and 45 CFR 171.103(a)(1)
explicitly exclude conduct that is
required by law from the definition of
information blocking. Therefore, if an
actor’s conduct is required by law, it
would not meet the definition of
information blocking, and OIG would
not have the authority to impose CMPs.
In the ONC Final Rule, ONC explained
that court orders and binding
administrative decisions are considered
VerDate Sep<11>2014
17:49 Jun 30, 2023
Jkt 259001
‘‘required by law.’’ 85 FR 25794, May 1,
2020.
Comment: Some commenters sought
clarification about how OIG will
consider the proposed factors and
whether they will be weighted. Some
commenters requested additional detail
on the range of potential penalty
amounts that OIG may issue and the
circumstances or thresholds that trigger
such penalty amounts. For example, one
commenter requested a chart to show
how different facts and circumstances
would result in different penalty
amounts. This commenter also proposed
that OIG set a baseline penalty amount
to provide guidance on how OIG would
set penalties for specific conduct. Some
commenters requested clarification on
the circumstances and thresholds
leading up to the maximum penalty of
$1 million. One commenter asked
whether penalties assessed would be
per organization impacted by the
information blocking or per patient
impacted by the information blocking.
Response: Our goal in setting penalty
amounts is for a penalty to be fair,
reasonable, and commensurate with the
conduct so that wrongdoers are held
accountable and future information
blocking conduct is deterred.
Accordingly, setting penalty amounts
necessitates consideration of the
particular facts of each case and does
not lend itself to one-size-fits-all
formulas or thresholds. The amount of
each penalty will be determined per
violation and will be based on the
aggravating and mitigating factors.
Section 3022(b)(2)(A) of the PHSA
requires the consideration of the
number of providers affected and the
number of patients affected when
evaluating the nature and extent of the
information blocking and the harm
resulting from such information
blocking. We consider the number of
providers affected and number of
patients affected under 42 CFR
1003.1420. In evaluating the nature and
extent of the violation, we may also
consider the number of organizations
impacted by the information blocking,
in addition to the number of patients
and providers affected.2
The penalty amount will be based on
a case-specific application of each
identified aggravating and mitigating
factor. Because penalty amounts require
case-by-case evaluation, we decline to
2 We could consider the number of organizations
under the ‘‘nature and circumstances of the
violation’’ factor at 42 CFR 1003.140 or the ‘‘nature
and extent of information blocking’’ at 42 CFR
1003.1420. As we discuss elsewhere in this section
IV.A.5 of the preamble, the factors set forth at 42
CFR 1003.140 may overlap at 42 CFR 1003.1420,
but we would not double count them.
PO 00000
Frm 00016
Fmt 4701
Sfmt 4700
set a baseline penalty amount, set
thresholds, or create a chart as
commenters requested. Similarly, in
assessing a penalty amount, OIG may
weigh the aggravating and mitigating
factors at 42 CFR 1003.140 and
1003.1420, but this weighting will not
follow a formula. Application of the
aggravating and mitigating factors will
result in the penalty assessed being fair
and reasonable. We would expect that
the maximum penalty of $1 million per
violation would apply to particularly
egregious conduct.
Comment: Some commenters had
concerns that when considering the
number of patients and number of
providers affected, OIG would impose
lower penalty amounts for information
blocking against smaller entities,
thereby incentivizing information
blocking against smaller entities. Other
commenters raised concerns that the
inclusion and implementation of the
‘‘number of days’’ factor in determining
CMP amounts would result in an
improperly low penalty amount for
conduct that had serious effects but did
not last long.
Response: Section 3022(b)(2)(A) of the
PHSA requires OIG to consider, among
other factors, the number of patients
affected, the number of providers
affected, and the number of days the
information blocking persisted. As
noted above, OIG’s determination of a
penalty amount will not rely on a rigid
formula for weighing those factors but
rather on a case-specific analysis of each
identified aggravating and mitigating
factor. Nothing in these factors would
require OIG to impose a lower CMP
amount for information blocking against
small entities, even when such entities
have fewer patients and providers than
larger entities. OIG is mindful that
information blocking against small
entities can have significant adverse
impacts for the entities and their
patients and providers. For example,
application of the factors at 42 CFR
1003.1420(a) and (b) to the specific facts
and circumstances could result in a
higher penalty because the information
blocking had significant, negative
impacts even for short periods of time
on an individual or small entities.
Moreover, if conduct results in
significant harm, including lasting harm
to patients, OIG would consider such
harm as a potential aggravating factor
when determining the appropriate
penalty amount.
Comment: Some commenters
requested clarification about what OIG
considers to be ‘‘harm resulting from’’
information blocking. Some commenters
suggested OIG should interpret ‘‘harm’’
to mean physical harm to a patient’s
E:\FR\FM\03JYR2.SGM
03JYR2
lotter on DSK11XQN23PROD with RULES2
Federal Register / Vol. 88, No. 126 / Monday, July 3, 2023 / Rules and Regulations
health and well-being and suggested
that OIG also consider financial harm
that patients, providers, or third-party
actors suffer as a result of information
blocking. Other commenters raised
concerns that intentional information
blockers will be allowed to get away
with ‘‘near misses’’ if OIG does not
consider both the potential and actual
harm resulting from information
blocking as aggravating factors.
Response: In the proposed rule, we
stated that section 3022(b)(2)(A) of the
PHSA mandates that OIG must take into
consideration factors such as the nature
and extent of the information blocking
and the harm resulting from such
information blocking including, where
applicable, the number of patients
affected, the number of providers
affected, and the number of days the
information blocking persisted in
determining the amount of a CMP. 85
FR 22987, April 24, 2020. We proposed
incorporating these factors at 42 CFR
1003.1420, and noted that these factors
were like factors found in other sections
of part 1003. We did not propose a
definition of ‘‘harm’’ in the proposed
rule. We solicited comment on this
factor and other potential factors we
should consider.
In response to commenters’
suggestions regarding the types of harm
covered by § 1003.1420(b), we agree that
‘‘harm’’ should cover both physical and
financial harm. Nothing in section
3022(b)(2)(B) of the PHSA indicates that
harm should be limited to only one type
or a specific type of harm. We are not
finalizing a definition of the word harm.
We intend to interpret harm in
accordance with its plain meaning,
ensuring that we can consider a range of
harms that may result from information
blocking conduct. As we gain more
experience investigating and imposing
CMPs for information blocking, we may
add additional factors related to specific
types of harm through rulemaking.
We appreciate the concern regarding
intentional information blockers that
might get away with ‘‘near misses.’’ We
do not believe this would be the case.
The definition of information blocking
applies to conduct that is ‘‘likely’’ to
interfere with the access, exchange, or
use of EHI, thus capturing conduct with
a potential to cause harm. With respect
to determination of a penalty amount
after information blocking is
established, as noted above OIG will
consider a range of aggravating factors
and would not consider ‘‘resulting in
harm’’ in isolation.
6. Additional Comments
Comment: One commenter noted that
the proposed rule stated investigated
VerDate Sep<11>2014
17:49 Jun 30, 2023
Jkt 259001
parties may incur some costs in
response to an OIG investigation or
enforcement action and encouraged OIG
not to impose CMPs unless OIG
determined the party committed
information blocking. The commenter
also asked how investigative fees are
calculated in the instance that
investigated parties incur costs in
response to an OIG investigation or
enforcement action.
Response: OIG will impose CMPs
where appropriate and does not
separately charge costs to investigated
parties as the comment contemplates.
OIG also does not reimburse
investigated parties for costs. We
included estimated costs for
investigated parties or subjects in the
proposed rule as part of our Regulatory
Impact Analysis (RIA). The costs
described in the RIA only estimate the
potential economic impact of the
proposed rule, which includes costs that
a subject being investigated may incur.
For example, a party may incur costs in
preparing documents in response to a
subpoena or hiring an attorney to
represent them during an investigation.
B. CMPs, Assessments, and Exclusions
for Fraud or False Claims or Similar
Conduct Related to Grants, Contracts,
and Other Agreements
The Cures Act amendments to the
CMPL authorize the Secretary to impose
penalties, assessments, and exclusions
for a variety of fraudulent and other
improper conduct related to HHS grants,
contracts, and other agreements. 42
U.S.C. 1320a–7a(o)–(s). In the proposed
rule, we proposed to incorporate this
authority into 42 CFR parts 1003 and
1005, which is the existing regulatory
framework for the imposition and
appeal of OIG penalties, assessments,
and exclusions. We received comments
related to this authority on only three
topics: (1) the proposed definition of
‘‘other agreement’’ in 42 CFR 1003.110;
(2) the proposed aggravating and
mitigating factors in 42 CFR 1003.720
that will be used by OIG to determine
the severity of the penalties,
assessments, and exclusions it imposes;
and (3) OIG enforcement priorities. We
received no comments on the
definitions we proposed to add to 42
CFR 1003.110 except ‘‘other agreement’’
as noted above, and are finalizing those
definitions accordingly. We received no
comments on 42 CFR 1003.710, which
identifies the maximum penalties and
assessments OIG may impose for fraud
and other improper conduct involving
HHS grants, contracts, and other
agreements. We also received no
comments on changes to 42 CFR
1003.130, 1003.1550, and 1003.1580,
PO 00000
Frm 00017
Fmt 4701
Sfmt 4700
42835
which relate to the calculation and
collection of assessments imposed
under this part and the use of statistical
sampling. We finalize 42 CFR 1003.130,
1003.710, 1003.1550, and 1003.1580 as
proposed without modification
accordingly. We received no comments
on 42 CFR 1003.700, which sets forth
the bases for OIG’s imposition of
sanctions for fraud and other improper
conduct related to grants, contracts, and
other agreements, but are modifying 42
CFR 1003.700(a)(5) for clarity by adding
a citation to the existing regulatory
definition of ‘‘failure to grant timely
access’’ at 42 CFR 1003.200(b)(10). We
proposed, and are finalizing, that the
changes to 42 CFR 1003.110, 1003.130,
1003.700, 1003.710, 1003.720,
1003.1550, and 1003.1580 will be
effective 30 days from the publication
date of the final rule.
1. Definition of ‘‘Other Agreement’’
In the proposed rule, we proposed
adopting at 42 CFR 1003.110 the
statutory definition of ‘‘other
agreement’’ that would apply to CMPs
brought under 42 CFR 1003.700. This
definition includes but is not limited to
a cooperative agreement, scholarship,
fellowship, loan, subsidy, payment for a
specified use, donation agreement,
award, or subaward (regardless of
whether one or more of the persons
entering into the agreement is a
contractor or subcontractor). 42 U.S.C.
1320a–7a(q)(3). We noted in the
proposed rule that this definition is
broad and identifies a nonexclusive list
of arrangements that could constitute
‘‘other agreements’’ under the statute.
We stated that when OIG investigates
potential misconduct and decides
whether to impose sanctions, it will
evaluate matters on a case-by-case basis
to determine whether the funding
arrangement at issue constitutes an
‘‘other agreement’’ under the statute and
whether the conduct at issue violates
the statute. We are finalizing the
definition of ‘‘other agreement’’ as
proposed in 42 CFR 1003.110, without
modification.
Comment: Several commenters
requested that OIG provide more detail
on which arrangements could constitute
‘‘other agreements’’ under the
regulation. For example, one commenter
asked OIG to provide additional clarity
on how OIG will determine which
‘‘other agreements’’ fall within the
meaning of the statute. Another
commenter asked OIG to provide
specific examples of scenarios involving
‘‘other agreements’’ where it would
apply its CMPL authority.
Response: The statutory definition of
‘‘other agreement,’’ which has been
E:\FR\FM\03JYR2.SGM
03JYR2
42836
Federal Register / Vol. 88, No. 126 / Monday, July 3, 2023 / Rules and Regulations
lotter on DSK11XQN23PROD with RULES2
incorporated verbatim into 42 CFR
1003.110, is broad and defines ‘‘other
agreement’’ to include (but not be
limited to) a ‘‘cooperative agreement,
scholarship, fellowship, loan, subsidy,
payment for a specified use, donation
agreement, award, or subaward
(regardless of whether one or more of
the persons entering into the agreement
is a contractor or subcontractor).’’ It is
not possible to identify with specificity
all the various types of agreements that
may fall under the definition of ‘‘other
agreement.’’ The nine examples of
‘‘other agreement’’ identified in the
statute along with the text of 42 U.S.C.
1320a–7a(o)–(s) demonstrate that
Congress intended ‘‘other agreement’’ to
be read broadly to include, for example,
not only those direct agreements
between the Secretary and recipients of
HHS funding but also agreements
between recipients of HHS funding and
subrecipients such as subcontractors
and subawardees. The definition of
‘‘specified claim,’’ for example, includes
those requests for payment submitted by
a subawardee to an HHS awardee that
is receiving funding directly from the
Secretary. 42 U.S.C. 1320a–7a(r). In
addition, 42 U.S.C. 1320a–7a(o)(2)
permits OIG to impose sanctions upon
an entity that, among other things,
creates false documents that are
required to be submitted in order to
indirectly receive funds from the
Secretary. Any person that receives HHS
funding directly or indirectly through
an agreement is potentially subject to
liability under the CMPL if they engage
in any of the improper conduct
identified in the regulation including
but not limited to making
misrepresentations in applications for
the funding, presenting false or
fraudulent specified claims related to
the funding, and creating false records
related to the funding.
2. Factors in Mitigation and Aggravation
The regulation at 42 CFR 1003.720 of
the proposed rule proposed factors for
OIG to consider in mitigation and
aggravation when determining the
appropriate penalty, assessment, and
period of exclusion to impose upon
persons who engage in fraud and other
improper conduct related to HHS grants,
contracts, and other agreements. In 42
CFR 1003.720(a), for example, we
proposed that OIG would consider
identifying as a mitigating factor a
circumstance in which the amount of
funds involved with the improper
conduct was less than $5,000. Then, in
42 CFR 1003.720(b), we proposed
considering as an aggravating factor a
circumstance in which the amount of
funds involved was more than $50,000.
VerDate Sep<11>2014
17:49 Jun 30, 2023
Jkt 259001
We are finalizing 42 CFR 1003.720 as
proposed without modification.
Comment: One commenter suggested
that the proposed monetary thresholds
created in 42 CFR 1003.720(a) and (b) of
$5,000 and $50,000 are too low and
need to be adjusted upwards because
they will lead to overly harsh
determinations for CMPL violations
related to grants, contracts, and other
agreements that involve what the
commenter characterized as small
amounts of HHS funding. The
commenter suggested that OIG consider
it a mitigating factor in 42 CFR
1003.720(a) if the amount of funds
involved with the improper conduct
was less than $50,000 and consider it an
aggravating factor in 42 CFR 1003.720(b)
if the amount of funds involved with the
improper conduct was more than
$250,000.
Response: We are not accepting the
commenter’s suggestion to upwardly
adjust the monetary thresholds
proposed in 42 CFR 1003.720(a) and (b).
The thresholds proposed in 42 CFR
1003.720(a) and (b) are the same
thresholds that exist under 42 CFR
1003.220 related to damages sustained
by HHS for fraud and similar conduct
related to the Federal health care
programs. OIG believes it is important
for 42 CFR 1003.720 and 1003.220 to be
consistent because both provide
guidelines for OIG to evaluate the same
factor and relate to damages sustained
by HHS programs as a result of fraud or
similar conduct.
Comment: Two commenters requested
that OIG consider as a mitigating
circumstance in an action for failure to
grant timely access to OIG under 42 CFR
1003.700(a)(5) whether a party acted in
good faith in attempting to comply with
OIG’s request for timely access in
matters involving HHS grants, contracts,
or other agreements. The commenters
both pointed to challenges surrounding
the current COVID–19 pandemic as an
example of a circumstance in which a
party might act in good faith in
attempting to comply with OIG’s request
for access but might be unable to
comply with it.
Response: We are not adopting this
suggestion. Existing mitigating factors in
42 CFR 1003.140 that apply to all CMPs
in 42 CFR part 1003 address
commenters’ request to assess whether
the party acted in good faith as a
mitigating factor. As finalized, section
1003.720 identifies factors in mitigation
that OIG should consider when
imposing sanctions and states that those
factors should be read in conjunction
with the factors listed in 42 CFR
1003.140. Section 1003.140 requires
OIG to consider in mitigation ‘‘the
PO 00000
Frm 00018
Fmt 4701
Sfmt 4700
degree of culpability’’ of the person
against whom a sanction is imposed (42
CFR 1003.140(a)(2)), ‘‘the nature and
circumstances of the violation’’ (42 CFR
1003.140(a)(1)), and ‘‘such other matters
as justice may require’’ (42 CFR
1003.140(a)(5)). Under these existing
mitigating factors, we would account for
a party’s good faith in attempting to
comply with an OIG timely access
request consistent with 42 CFR
1003.140(a)(1), (2), and (5). Therefore, it
is unnecessary to explicitly add good
faith as a mitigating factor to 42 CFR
1003.720.
3. OIG Enforcement Regarding Grants,
Contracts, and Other Agreements
The regulation at 42 CFR 1003.700
identifies the grounds for OIG’s
imposition of penalties, assessments,
and exclusions for fraud and other
improper conduct related to HHS grants,
contracts, and other agreements, and
sets forth the levels of intent required to
violate each offense. One commenter
asked that OIG only exercise its
discretion to impose sanctions when it
finds bad intent or other truly abusive,
egregious, and intentional wrongdoing.
We are not adopting this suggestion and
are finalizing 42 CFR 1003.700 as
proposed with modification only to 42
CFR 1003.700(a)(5) as discussed below.
Comment: One commenter noted that
many HHS grants, contracts, and other
agreements are complex and require
specific and detailed information from
and actions by parties applying for the
funds. The commenter also noted that
regulatory requirements sometimes
change, especially in times of a PHE
such as the PHE for COVID–19, and that
complying with shifting requirements
can be difficult. The commenter asked
that OIG take into consideration these
complexities, ambiguities, and shifting
requirements when exercising its
discretion in enforcing the CMPs and
that it do so only when the facts
demonstrate bad intent or other truly
abusive, egregious, and intentional
wrongdoing by the parties applying for
or receiving HHS funds.
Response: The CMPL authorizes the
imposition of penalties, assessments,
and exclusions for a variety of
fraudulent and other improper conduct
related to HHS grants, contracts, and
other agreements, and sets forth the
levels of intent required to violate each
of the offenses it creates. 42 U.S.C.
1320a–7a(o). In determining whether to
impose sanctions and the severity of
those sanctions, OIG will consider all of
the relevant facts and circumstances
surrounding an allegation of
wrongdoing in light of the factors
identified in the CMPL (42 U.S.C.
E:\FR\FM\03JYR2.SGM
03JYR2
Federal Register / Vol. 88, No. 126 / Monday, July 3, 2023 / Rules and Regulations
1320a–7a(d)) and the regulation. 42 CFR
1003.140 and 1003.720. Depending on
the facts and circumstances of any
particular case, it may be appropriate for
OIG to consider the difficulties raised by
the commenter, including those related
to the PHE for COVID–19, in
determining whether a person has
violated the CMPL and, if so, the
severity of the sanction OIG proposes to
impose.
lotter on DSK11XQN23PROD with RULES2
4. Modification to 42 CFR 1003.700(a)(5)
The regulation at 42 CFR
1003.700(a)(5) incorporates into part
1003 OIG’s statutory authority under 42
U.S.C. 1320a–7a(o)(5) to impose CMPs,
assessments, and exclusions for the
failure to grant timely access to OIG for
the purpose of audits, investigations,
evaluations, or other statutory functions
of OIG in matters involving grants,
contracts, or other agreements. We
stated in the proposed rule at 85 FR
22982 that 42 U.S.C. 1320a–7a(o)(5)
largely mirrors the statutory language
that has for many years given OIG the
authority to impose sanctions for the
failure to grant timely access to OIG
related to health care claims.
Furthermore, we stated at 85 FR 22980
of the proposed rule that it was our
intent to incorporate into OIG’s existing
CMP regulations the new CMP
authorities related to fraud and other
misconduct involving HHS grants,
contracts, and other agreements.
However, our proposed regulatory text
at 42 CFR 1003.700(a)(5) omitted a
citation to the existing regulatory
definition of ‘‘failure to grant timely
access’’ that is located at
§ 1003.200(b)(10), in a section of part
1003 that relates to fraud involving
Federal health care claims. Consistent
with our intent to incorporate into part
1003 our authority to impose sanctions
for failure to grant timely access related
to grants, contracts, and other
agreements, our view that this authority
mirrors the authority OIG has had for
many years related to health care claims
and, for clarity, we are finalizing 42 CFR
1003.700(a)(5) with a cross-reference to
the existing definition of ‘‘failure to
grant timely access’’ to make clear that
the definition of that term at 42 CFR
1003.200(b)(10) is applicable to actions
under 42 CFR 1003.700(a)(5).
C. The Bipartisan Budget Act of 2018
The BBA of 2018 amended the CMPL
to increase certain CMP amounts
contained in 42 U.S.C. 1320a–7a(a) and
(b). The BBA 2018 increased maximum
civil money penalties in section
1128A(a) of the SSA (42 U.S.C. 1320a–
7a) from $10,000 to $20,000; from
$15,000 to $30,000; and from $50,000 to
VerDate Sep<11>2014
17:49 Jun 30, 2023
Jkt 259001
$100,000. The BBA 2018 increased
maximum civil money penalties in
section 1128A(b) of the SSA from
$2,000 to $5,000 in paragraph (1), from
$2,000 to $5,000 in paragraph (2), and
from $5,000 to $10,000 in paragraph
(3)(A)(i). This statutory increase in CMP
amounts is effective for acts committed
after the date of enactment, February 9,
2018. In the proposed rule, we proposed
increasing the civil money penalties in
accordance with the BBA 2018.
Specifically, for conformity with the
CMPL as amended by the BBA 2018, we
proposed to revise the civil money
penalties contained at 42 CFR 1003.210,
1003.310, and 1003.1010.
The BBA 2018 increased penalty
maximums for conduct that occurred
after February 9, 2018. Accordingly, for
each of the provisions below, we
proposed language increasing the
maximum penalty for conduct that
occurred after February 9, 2018, and
maintaining the pre-BBA 2018 penalty
maximums for conduct that occurred on
or before that date. The penalty amounts
for conduct that occurred after February
9, 2018, in proposed 42 CFR 1003.210
were as follows: $20,000 for paragraphs
(a)(1), (3), (4), and (8); $30,000 for
paragraphs (a)(2) and (9); $100,000 for
paragraphs (a)(6) and (7); and $10,000
for paragraph (a)(10)(i). Similarly, we
proposed to increase the penalty
maximum for conduct that occurred
after February 9, 2018, at 42 CFR
1003.310(a)(3) to $100,000, and at 42
CFR 1003.1010(a) to $20,000. We
received no comments on this proposal
and we are finalizing the penalty
amounts as proposed without
modification, effective August 2, 2023
as required by the Administrative
Procedure Act (APA).
E. Additional Changes to Part 1003
We proposed to change the crossreference in 42 1003.140(c)(3) to correct
a scrivener’s error from a prior
rulemaking on December 7, 2018. 81 FR
88354. We proposed to add a new
paragraph (d)(5) to 42 CFR 1003.140
stating that the penalty amounts in part
1003 are adjusted annually for inflation
and eliminating the footnotes 1 through
12 in part 1003 to simplify those
sections. We received no comments on
these proposed changes, and we are
finalizing them with a correction to a
typographical error in the regulatory
text in the citation to the Federal Civil
Penalties Inflation Adjustment Act of
1990 (Pub. L. 101–410) effective August
2, 2023.
F. Changes to 42 CFR Part 1005
The procedures set forth in part 1005
govern the appeal of CMPs, assessments,
PO 00000
Frm 00019
Fmt 4701
Sfmt 4700
42837
and exclusions in all cases for which
OIG has been delegated authority to
impose those sanctions including cases
involving grants, contracts, and other
agreements, and information blocking.
As such, we proposed deleting the
phrase ‘‘under Medicare or the State
health care programs’’ from the
definitions of ‘‘civil money penalty
cases’’ and ‘‘exclusion cases’’ at 42 CFR
1005.1 to correctly define those terms as
applying to all cases for which OIG has
been delegated authority to apply CMPs,
assessments, and exclusions not only to
those cases involving Medicare or the
State health care programs. We received
no comments regarding this change and
are finalizing it as proposed, without
modification, in 42 CFR 1005.1,
effective August 2, 2023.
IV. Regulatory Impact Statement
We have examined the impact of this
final rule as required by Executive
Order 12866, the Regulatory Flexibility
Act (RFA) of 1980, the Unfunded
Mandates Reform Act of 1995, and
Executive Order 13132.
A. Executive Order No. 12866
Executive Order 12866 directs
agencies to assess all costs and benefits
of available regulatory alternatives and,
if regulations are necessary, to select
regulatory approaches that maximize
net benefits (including potential
economic, environmental, and public
health and safety effects; distributive
impacts; and equity). A regulatory
impact analysis must be prepared for
major rules with significant effects per
section 3(f)(1) of Executive Order 12866
(i.e., $200 million or more in any given
year). This is not a major rule as defined
at 5 U.S.C. 804(2); it is not significant
per section 3(f)(1) because it does not
reach that economic threshold. The vast
majority of Federal health care programs
would be minimally impacted from an
economic perspective, if at all, by these
proposals.
This final rule would enact new
statutory enforcement provisions,
including new CMP authorities. The
regulatory changes implement
provisions of the Cures Act and BBA
2018 into 42 CFR parts 1003 and 1005.
We believe that the likely aggregate
economic effect of these regulations
would be significantly less than $100
million.
The expected benefits of the
regulation are deterring conduct that
negatively affects the integrity of HHS
grants, contracts, and other agreements
and potentially enhanced statutory
compliance by HHS grantees,
contractors, and other parties. It also
will deter information blocking conduct
E:\FR\FM\03JYR2.SGM
03JYR2
42838
Federal Register / Vol. 88, No. 126 / Monday, July 3, 2023 / Rules and Regulations
that interferes with effective health
information exchange and negatively
impacts many important aspects of
health and health care. We refer readers
to the impact analysis of the benefits of
prohibiting and deterring information
blocking in section XII.C.2.a.(4.2) of the
ONC Final Rule, 85 FR 25906, May 1,
2020.
We anticipate that OIG will incur
some costs associated with investigation
and enforcement of the statutes
underlying these penalty provisions.
The Consolidated Appropriations Act,
2022 appropriates to OIG funding
necessary for carrying out information
blocking activities. Public Law 117–103,
March 15, 2022. Additionally,
investigated parties may incur some
costs in response to an OIG
investigation or enforcement action.
Absent information about the frequency
of prohibited conduct, we are unable to
determine precisely the potential costs
of this regulation.
Civil money penalties and
assessments, if any, would be
considered transfers. However, we are
unable to reliably estimate potential
penalty and assessment amounts
because enforcement action will depend
on the facts and circumstances of
individual cases, some conduct subject
to enforcement will be newly regulated,
and some cases may result in
settlement. We did not receive any
comments on potential impacts of the
rulemaking.
lotter on DSK11XQN23PROD with RULES2
B. Regulatory Flexibility Act
The RFA and the Small Business
Regulatory Enforcement and Fairness
Act of 1996, which amended the RFA,
require agencies to analyze options for
regulatory relief of small businesses. For
purposes of the RFA, small entities
include small businesses, nonprofit
organizations, and Government
agencies.
The Department considers a rule to
have a significant impact on a
substantial number of small entities if it
has an impact of more than 3 percent of
revenue for more than 5 percent of
affected small entities. This final rule
should not have a significant impact on
the operations of a substantial number
of small entities, as these changes would
not impose any new requirement on any
party. These changes largely enact
existing regulatory authority. In
addition, we expect that increases in the
maximum penalty finalized here will
only have an impact in a small number
of cases. As a result, we have concluded
that this final rule likely will not have
a significant impact on a substantial
number of small entities and that a
VerDate Sep<11>2014
17:49 Jun 30, 2023
Jkt 259001
regulatory flexibility analysis is not
required for this rulemaking.
In addition, section 1102(b) of the
SSA (42 U.S.C. 1302) requires us to
prepare a regulatory impact analysis if
a rule under Titles XVIII or XIX or
section B of Title XI of the SSA may
have a significant impact on the
operations of a substantial number of
small rural hospitals. We have
concluded that this final rule should not
have a significant impact on the
operations of a substantial number of
small rural hospitals because these
changes would not impose any
requirement on any party and small
rural hospitals are not subject to CMPs
for information blocking under this final
rule. Therefore, a regulatory impact
analysis under section 1102(b) is not
required for this rulemaking.
C. Unfunded Mandates Reform Act
Section 202 of the Unfunded
Mandates Reform Act of 1995, Public
Law 104–4, also requires that agencies
assess anticipated costs and benefits
before issuing any rule that may result
in expenditures in any one year by
State, local, or Tribal governments in
the aggregate, or by the private sector, of
$100 million, adjusted annually for
inflation. We believe that there are no
significant costs associated with these
revisions that would impose any
mandates on State, local, or Tribal
governments or the private sector that
would result in an expenditure of $158
million (after adjustment for inflation)
or more in any given year and that a full
analysis under the Unfunded Mandates
Reform Act is not necessary.
D. Executive Order 13132
Executive Order 13132, Federalism,
establishes certain requirements that an
agency must meet when it promulgates
a rule that imposes substantial direct
requirements or costs on State and local
governments, preempts State law, or
otherwise has federalism implications.
In reviewing this rule under the
threshold criteria of Executive Order
13132, we have determined that this
final rule would not significantly affect
the rights, roles, and responsibilities of
State or local governments. Nothing in
this final rule imposes substantial direct
requirements or costs on State and local
governments, preempts State law, or
otherwise has federalism implications.
We are not aware of any State laws or
regulations that are contradicted or
impeded by any of the provisions in this
final rule.
The Secretary is authorized by 42
U.S.C. 1320a–7a(o), which we enact in
the regulation at 42 CFR 1003.700, to
impose CMPs and assessments against
PO 00000
Frm 00020
Fmt 4701
Sfmt 4700
individuals and entities that engage in
fraud and other improper conduct
against specified State agencies that
administer or supervise the
administration of grants, contracts, and
other agreements funded in whole or in
part by the Secretary. Additionally, 42
U.S.C. 1320a–7a(f)(4) directs that these
CMPs and assessments be deposited
into the Treasury of the United States.
Amounts collected under this authority
could not be used to compensate a State
for damages it incurs due to improper
conduct related to grants, contracts, or
other agreements funded by the
Secretary that are administered or
supervised by specified State agencies.
However, neither 42 U.S.C. 1320a–7a
nor this final rule preclude or impede
any State’s authority to pursue actions
against entities and individuals that
defraud or otherwise engage in
improper conduct related to grants,
contracts, or other agreements funded
by the Secretary that are administered or
supervised by specified State agencies.
For this reason, the Secretary’s authority
related to specified State agencies will
not have a substantial direct effect on
the States, on the relationship between
the National Government and the States,
or on the distribution of power and
responsibilities among the various
levels of government.
Based on OIG’s prior approach to
enforcement that involves State
programs and agencies, we also
anticipate coordinating closely with the
relevant State authorities, which would
provide States notice about the
improper conduct and the opportunity
to pursue action under the State
authority.
V. Paperwork Reduction Act
These changes to parts 1003 and 1005
impose no new reporting requirements
or collections of information. Therefore,
a Paperwork Reduction Act review is
not required.
List of Subjects
42 CFR Part 1003
Contracts, Fraud, Grant programs—
health, Information blocking, Penalties.
42 CFR Part 1005
Administrative practice and
procedure.
For the reasons stated in the
preamble, the Office of Inspector
General, Department of Health and
Human Services, amends 42 CFR
chapter V, subchapter B, as follows:
E:\FR\FM\03JYR2.SGM
03JYR2
Federal Register / Vol. 88, No. 126 / Monday, July 3, 2023 / Rules and Regulations
PART 1003—CIVIL MONEY
PENALTIES, ASSESSMENTS AND
EXCLUSIONS
1. Revise the authority citation for part
1003 to read as follows:
■
Authority: 42 U.S.C. 262a, 300jj–52, 1302,
1320a–7, 1320a–7a, 1320b–10, 1395u(j),
1395u(k), 1395cc(j), 1395w–141(i)(3),
1395dd(d)(1), 1395mm, 1395nn(g), 1395ss(d),
1396b(m), 11131(c), and 11137(b)(2).
2. Amend § 1003.100 by:
a. Revising paragraph (a); and
b. In paragraph (b)(1), adding
‘‘(CMPs)’’ following ‘‘civil money
penalties’’ and a semicolon following
‘‘this part’’.
The revision reads as follows:
■
■
■
§ 1003.100
Basis and purpose.
(a) Basis. This part implements
sections 1128(c), 1128A, 1140,
1819(b)(3)(B), 1819(g)(2)(A),
1857(g)(2)(A), 1860D–12(b)(3)(E),
1860D–31(i)(3), 1862(b)(3)(C),
1867(d)(1), 1876(i)(6), 1877(g), 1882(d),
1891(c)(1); 1903(m)(5), 1919(b)(3)(B),
1919(g)(2)(A), 1927(b)(3)(B),
1927(b)(3)(C), and 1929(i)(3) of the
Social Security Act; sections 421(c) and
427(b)(2) of Public Law 99–660; section
201(i) of Public Law 107–188 (42 U.S.C.
1320a–7(c), 1320a–7a, 1320b–10, 1395i–
3(b)(3)(B), 1395i–3(g)(2)(A), 1395w–
27(g)(2)(A), 1395w–112(b)(3)(E), 1395w–
141(i)(3), 1395y(b)(3)(B), 1395dd(d)(1),
1395mm(i)(6), 1395nn(g), 1395ss(d),
1395bbb(c)(1), 1396b(m)(5),
1396r(b)(3)(B), 1396r(g)(2)(A), 1396r–
8(b)(3)(B), 1396r–8(b)(3)(C), 1396t(i)(3),
11131(c), 11137(b)(2), and 262a(i)); and
section 3022 of the Public Health
Service Act (42 U.S.C. 300jj–52).
*
*
*
*
*
■ 3. Amend § 1003.110 by:
■ a. Adding the definitions of
‘‘Department,’’ ‘‘Obligation,’’ ‘‘Other
agreement,’’ and ‘‘Program beneficiary’’
in alphabetical order;
■ b. Revising the definition of
‘‘Reasonable request;’’ and
■ c. Adding the definitions of
‘‘Recipient,’’ ‘‘Specified claim,’’ and
‘‘Specified State agency’’ in alphabetical
order.
The revision and additions read as
follows:
§ 1003.110
Definitions.
lotter on DSK11XQN23PROD with RULES2
*
*
*
*
*
Department means the Department of
Health and Human Services.
*
*
*
*
*
Obligation for the purposes of
§ 1003.700 means an established duty,
whether or not fixed, arising from an
express or implied contractual, grantorgrantee, or licensor-licensee relationship
VerDate Sep<11>2014
17:49 Jun 30, 2023
Jkt 259001
for a fee-based or similar relationship,
from statute or regulation, or from the
retention of any overpayment.
Other agreement for the purposes of
§ 1003.700 includes a cooperative
agreement, scholarship, fellowship,
loan, subsidy, payment for a specified
use, donation agreement, award, or
subaward (regardless of whether one or
more of the persons entering into the
agreement is a contractor or
subcontractor).
*
*
*
*
*
Program beneficiary means—in the
case of a grant, contract, or other
agreement designed to accomplish the
objective of awarding or otherwise
furnishing benefits or assistance to
individuals and for which the Secretary
provides funding—an individual who
applies for or who receives such
benefits or assistance from such grant,
contract, or other agreement. Such term
does not include—with respect to such
grant, contract, or other agreement—an
officer, employee, or agent of a person
or entity that receives such grant or that
enters into such contract or other
agreement.
Reasonable request with respect to
§§ 1003.200(b)(10) and 1003.700(a)(5)
means a written request signed by a
designated representative of the OIG
and made by a properly identified agent
of the OIG during reasonable business
hours. The request will include:
(1) A statement of the authority for the
request;
(2) The person’s rights in responding
to the request;
(3) The definition of ‘‘reasonable
request’’ and ‘‘failure to grant timely
access’’ under this part;
(4) The deadline by which the OIG
requests access; and
(5) The amount of the civil money
penalty or assessment that could be
imposed and the effective date, length,
and scope and effect of the exclusion
that would be imposed for failure to
comply with the request, and the
earliest date that a request for
reinstatement would be considered.
Recipient for the purposes of
§ 1003.700 means any person (excluding
a program beneficiary as defined in this
section) directly or indirectly receiving
money or property under a grant,
contract, or other agreement funded in
whole or in part by the Secretary,
including a subrecipient or
subcontractor.
*
*
*
*
*
Specified claim means any
application, request, or demand under a
grant, contract, or other agreement for
money or property, whether or not the
United States or a specified State agency
PO 00000
Frm 00021
Fmt 4701
Sfmt 4700
42839
has title to the money or property, that
is not a claim (as defined in this section)
and that:
(1) Is presented or caused to be
presented to an officer, employee, or
agent of the Department or agency
thereof, or of any specified State agency;
or
(2) Is made to a contractor, grantee, or
other recipient if the money or property
is to be spent or used on the
Department’s behalf or to advance a
Department program or interest, and if
the Department:
(i) Provides or has provided any
portion of the money or property
requested or demanded; or
(ii) Will reimburse such contractor,
grantee, or other recipient for any
portion of the money or property which
is requested or demanded.
Specified State agency means an
agency of a State government
established or designated to administer
or supervise the administration of a
grant, contract, or other agreement
funded in whole or in part by the
Secretary.
*
*
*
*
*
■ 4. Revise § 1003.130 to read as
follows:
§ 1003.130
Assessments.
The assessment in this part is in lieu
of damages sustained by the
Department, a State agency, or a
specified State agency because of the
violation.
■ 5. Amend § 1003.140 by:
■ a. In paragraph (c)(3), removing the
phrase ‘‘(as defined by paragraph (e)(2)
of this section)’’ and adding the phrase
‘‘(as defined by paragraph (d)(2) of this
section)’’ in its place.
■ b. Adding paragraph (d)(5).
The addition reads as follows:
§ 1003.140 Determinations regarding the
amount of penalties and assessments and
the period of exclusion.
*
*
*
*
*
(d) * * *
(5) The penalty amounts in this part
are updated annually, as adjusted in
accordance with the Federal Civil
Penalties Inflation Adjustment Act of
1990, as amended by the Federal Civil
Penalties Inflation Adjustment Act
Improvements Act of 2015 (section 701
of Pub. L. 114–74). Annually adjusted
amounts are published at 45 CFR part
102.
■ 6. Amend § 1003.210 by revising
paragraphs (a)(1) through (4) and (6)
through (9), (a)(10) introductory text,
and (a)(10)(i) to read as follows:
§ 1003.210 Amount of penalties and
assessments.
(a) * * *
E:\FR\FM\03JYR2.SGM
03JYR2
lotter on DSK11XQN23PROD with RULES2
42840
Federal Register / Vol. 88, No. 126 / Monday, July 3, 2023 / Rules and Regulations
(1) Except as provided in this section,
the OIG may impose a penalty of not
more than $10,000 for conduct that
occurred on or before February 9, 2018,
and not more than $20,000 for conduct
that occurred after February 9, 2018, for
each individual violation that is subject
to a determination under this subpart.
(2) The OIG may impose a penalty of
not more than $15,000 for conduct that
occurred on or before February 9, 2018,
and not more than $30,000 for conduct
that occurred after February 9, 2018, for
each person with respect to whom a
determination was made that false or
misleading information was given under
§ 1003.200(b)(2).
(3) The OIG may impose a penalty of
not more than $10,000 for conduct that
occurred on or before February 9, 2018,
and not more than $20,000 for conduct
that occurred after February 9, 2018, per
day for each day that the prohibited
relationship described in
§ 1003.200(b)(3) occurs.
(4) For each individual violation of
§ 1003.200(b)(4), the OIG may impose a
penalty of not more than $10,000 for
conduct that occurred on or before
February 9, 2018, and not more than
$20,000 for conduct that occurred after
February 9, 2018, for each separately
billable or non-separately-billable item
or service provided, furnished, ordered,
or prescribed by an excluded individual
or entity.
*
*
*
*
*
(6) The OIG may impose a penalty of
not more than $50,000 for conduct that
occurred on or before February 9, 2018,
and not more than $100,000 for conduct
that occurred after February 9, 2018, for
each false statement, omission, or
misrepresentation of a material fact in
violation of § 1003.200(b)(7).
(7) The OIG may impose a penalty of
not more than $50,000 for conduct that
occurred on or before February 9, 2018,
and not more than $100,000 for conduct
that occurred after February 9, 2018, for
each false record or statement in
violation of § 1003.200(b)(9).
(8) The OIG may impose a penalty of
not more than $10,000 for conduct that
occurred on or before February 9, 2018,
and not more than $20,000 for conduct
that occurred after February 9, 2018, for
each item or service related to an
overpayment that is not reported and
returned in accordance with section
1128J(d) of the Act in violation of
§ 1003.200(b)(8).
(9) The OIG may impose a penalty of
not more than $15,000 for conduct that
occurred on or before February 9, 2018,
and not more than $30,000 for conduct
that occurred after February 9, 2018, for
each day of failure to grant timely access
in violation of § 1003.200(b)(10).
VerDate Sep<11>2014
17:49 Jun 30, 2023
Jkt 259001
(10) For each false certification in
violation of § 1003.200(c), the OIG may
impose a penalty of not more than the
greater of:
(i) $5,000 for conduct that occurred
on or before February 9, 2018, and
$10,000 for conduct that occurred after
February 9, 2018; or
*
*
*
*
*
■ 7. Amend § 1003.310 by revising
paragraph (a)(3) to read as follows:
§ 1003.310 Amount of penalties and
assessments.
(a) * * *
(3) $50,000 for conduct that occurred
on or before February 9, 2018, and
$100,000 for conduct that occurred after
February 9, 2018, for each offer,
payment, solicitation, or receipt of
remuneration that is subject to a
determination under § 1003.300(d).
*
*
*
*
*
■ 8. Add subpart G (consisting of
§§ 1003.700, 1003.710, and 1003.720) to
read as follows:
Subpart G—CMPs, Assessments, and
Exclusions for Fraud or False Claims
or Similar Conduct Related to Grants,
Contracts, and Other Agreements
Sec.
1003.700 Basis for civil money penalties,
assessments, and exclusions.
1003.710 Amount of penalties and
assessments.
1003.720 Determinations regarding the
amount of penalties and assessments and
period of exclusion.
§ 1003.700 Basis for civil money penalties,
assessments, and exclusions.
The OIG may impose a penalty,
assessment, and an exclusion against
any person including an organization,
agency, or other entity, but excluding a
program beneficiary (as defined in
§ 1003.110), that, with respect to a grant,
contract, or other agreement for which
the Secretary provides funding:
(a) Knowingly presents or causes to be
presented a specified claim (as defined
in § 1003.110) under such grant,
contract, or other agreement that the
person knows or should know is false or
fraudulent;
(b) Knowingly makes, uses, or causes
to be made or used, any false statement,
omission, or misrepresentation of a
material fact in any application,
proposal, bid, progress report, or other
document that is required to be
submitted in order to directly or
indirectly receive or retain funds
provided in whole or in part by such
Secretary pursuant to such grant,
contract, or other agreement;
(c) Knowingly makes, uses, or causes
to be made or used, a false record or
PO 00000
Frm 00022
Fmt 4701
Sfmt 4700
statement material to a false or
fraudulent specified claim under such
grant, contract, or other agreement;
(d) Knowingly makes, uses, or causes
to be made or used, a false record or
statement material to an obligation (as
defined in § 1003.110) to pay or transmit
funds or property to such Secretary with
respect to such grant, contract, or other
agreement, or knowingly conceals or
knowingly and improperly avoids or
decreases an obligation to pay or
transmit funds or property to such
Secretary with respect to such grant,
contract, or other agreement; or
(e) Fails to grant timely access (as
defined in § 1003.200(b)(10)), upon
reasonable request (as defined in
§ 1003.110), to the Inspector General of
the Department, for the purpose of
audits, investigations, evaluations, or
other statutory functions of such
Inspector General in matters involving
such grants, contracts, or other
agreements.
§ 1003.710 Amount of penalties and
assessments.
(a) Penalties. (1) In cases under
§ 1003.700(a)(1), the OIG may impose a
penalty of not more than $10,000 for
each specified claim.
(2) In cases under § 1003.700(a)(2), the
OIG may impose a penalty of not more
than $50,000 for each false statement,
omission, or misrepresentation of a
material fact.
(3) In cases under § 1003.700(a)(3), the
OIG may impose a penalty of not more
than $50,000 for each false record or
statement.
(4) In cases under § 1003.700(a)(4), the
OIG may impose a penalty of not more
than $50,000 for each false record or
statement or not more than $10,000 for
each day that the person knowingly
conceals or knowingly and improperly
avoids or decreases an obligation to pay.
(5) In cases under § 1003.700(a)(5), the
OIG may impose a penalty of not more
than $15,000 for each day of the failure
described in § 1003.700(a)(5).
(b) Assessments. (1) In cases under
§ 1003.700(a)(1) and (3), such a person
shall be subject to an assessment of not
more than three times the amount
claimed in the specified claim described
in § 1003.700(a)(1) and (3) in lieu of
damages sustained by the United States
or a specified State agency because of
such specified claim.
(2) In cases under § 1003.700(a)(2) and
(4), such a person shall be subject to an
assessment of not more than three times
the total amount of the funds described
in § 1003.700(a)(2) and (4), respectively
(or, in the case of an obligation to
transmit property to the Secretary
described in § 1003.700(a)(4), of the
E:\FR\FM\03JYR2.SGM
03JYR2
Federal Register / Vol. 88, No. 126 / Monday, July 3, 2023 / Rules and Regulations
value of the property described in
§ 1003.700(a)(4)) in lieu of damages
sustained by the United States or a
specified State agency because of such
case.
§ 1003.720 Determinations regarding the
amount of penalties and assessments and
period of exclusion.
In considering the factors listed in
§ 1003.140:
(a) It should be considered a
mitigating circumstance if all the
violations included in the action
brought under this part were of the same
type and occurred within a short period
of time, there were few such violations,
and the total amount claimed or
requested related to the violations was
less than $5,000.
(b) Aggravating circumstances include
but are not limited to:
(1) The violations were of several
types or occurred over a lengthy period
of time;
(2) There were many such violations
(or the nature and circumstances
indicate a pattern of false or fraudulent
specified claims, requests for payment,
or a pattern of violations);
(3) The amount requested or claimed
or related to the violations was $50,000
or more; or
(4) The violation resulted, or could
have resulted, in physical harm to any
individual.
§ 1003.1010
[Amended]
9. Amend § 1003.1010 in paragraph
(a) by removing the figure ‘‘$10,000’’
and adding in its place the phrase
‘‘$10,000 for conduct that occurred on
or before February 9, 2018, and $20,000
for conduct that occurred after February
9, 2018,’’.
■ 10. Effective September 1, 2023, add
subpart N (consisting of §§ 1003.1400,
1003.1410, and 1003.1420) to read as
follows:
■
Subpart N—CMPs for Information
Blocking
Sec.
1003.1400 Basis for civil money penalties.
1003.1410 Amount of penalties.
1003.1420 Determinations regarding the
amount of penalties.
§ 1003.1400
penalties.
Basis for civil money
lotter on DSK11XQN23PROD with RULES2
The OIG may impose a civil money
penalty against any individual or entity
VerDate Sep<11>2014
17:49 Jun 30, 2023
Jkt 259001
described in 45 CFR 171.103(a)(2) that
commits information blocking, as set
forth in 45 CFR part 171.
§ 1003.1410
Amount of penalties.
The OIG may impose a penalty of not
more than $1,000,000 per violation.
(a) For this subpart, violation means a
practice, as defined in 45 CFR 171.102,
that constitutes information blocking, as
set forth in 45 CFR part 171.
(b) [Reserved]
§ 1003.1420 Determinations regarding the
amount of penalties.
In considering the factors listed in
§ 1003.140, the OIG shall take into
account:
(a) The nature and extent of the
information blocking including where
applicable:
(1) The number of patients affected;
(2) The number of providers affected;
and
(3) The number of days the
information blocking persisted; and
(b) The harm resulting from such
information blocking including where
applicable:
(1) The number of patients affected;
(2) The number of providers affected;
and
(3) The number of days the
information blocking persisted.
§ 1003.1550
[Amended]
11. Amend § 1003.1550 in paragraph
(b) by removing the phrase ‘‘where the
claim’’ and adding the phrase ‘‘where
the claim or specified claim’’ in its
place.
■ 12. Amend § 1003.1580 by revising
paragraph (a) to read as follows:
42841
§ § 1003.210, 1003.310, 1003.410, 1003.510,
1003.610, 1003.810, 1003.910, 1003.1010,
1003.110, 1003.1210, and 1003.1310
[Amended]
13. In addition to the amendments set
forth above, in 42 CFR part 1003, amend
each section referenced in the first
column of the following table by
removing the footnote referenced in the
second column.
■
Section
Footnote
1003.210(a) heading ..................
1003.310(a) heading ..................
1003.410(a) heading ..................
1003.410(b)(2) ............................
1003.510 introductory text ..........
1003.610(a) introductory text .....
1003.810 introductory text ..........
1003.910 .....................................
1003.1010 introductory text ........
1003.1110 introductory text ........
1003.1210 introductory text ........
1003.1310 ...................................
1
2
3
4
5
6
7
8
9
10
11
12
PART 1005—APPEALS OF
EXCLUSIONS, CIVIL MONEY
PENALTIES AND ASSESSMENTS
14. The authority citation for part
1005 continues to read as follows:
■
Authority: 42 U.S.C. 405(a), 405(b), 1302,
1320a–7, 1320a–7a and 1320c–5.
■
§ 1003.1580
Statistical sampling.
(a) In meeting the burden of proof in
§ 1005.15 of this chapter, the OIG may
introduce the results of a statistical
sampling study as evidence of the
number and amount of claims, specified
claims, and/or requests for payment, as
described in this part, that were
presented, or caused to be presented, by
the respondent. Such a statistical
sampling study, if based upon an
appropriate sampling and computed by
valid statistical methods, shall
constitute prima facie evidence of the
number and amount of claims, specified
claims, or requests for payment, as
described in this part.
*
*
*
*
*
PO 00000
Frm 00023
Fmt 4701
Sfmt 9990
15. Amend § 1005.1 by revising the
definitions of ‘‘Civil money penalty
cases’’ and ‘‘Exclusion cases’’ to read as
follows:
■
§ 1005.1
Definitions.
Civil money penalty cases refers to all
proceedings arising under any of the
statutory bases for which the OIG has
been delegated authority to impose civil
money penalties (CMPs).
*
*
*
*
*
Exclusion cases refers to all
proceedings arising under any of the
statutory bases for which the OIG has
been delegated authority to impose
exclusions.
*
*
*
*
*
Dated: June 26, 2023.
Xavier Becerra,
Secretary.
[FR Doc. 2023–13851 Filed 6–30–23; 8:45 am]
BILLING CODE 4152–01–P
E:\FR\FM\03JYR2.SGM
03JYR2
Agencies
[Federal Register Volume 88, Number 126 (Monday, July 3, 2023)]
[Rules and Regulations]
[Pages 42820-42841]
From the Federal Register Online via the Government Publishing Office [www.gpo.gov]
[FR Doc No: 2023-13851]
[[Page 42819]]
Vol. 88
Monday,
No. 126
July 3, 2023
Part II
Department of Health and Human Services
-----------------------------------------------------------------------
Office of Inspector General
-----------------------------------------------------------------------
42 CFR Parts 1003 and 1005
Grants, Contracts, and Other Agreements: Fraud and Abuse; Information
Blocking; Office of Inspector General's Civil Money Penalty Rules;
Final Rule
Federal Register / Vol. 88, No. 126 / Monday, July 3, 2023 / Rules
and Regulations
[[Page 42820]]
-----------------------------------------------------------------------
DEPARTMENT OF HEALTH AND HUMAN SERVICES
Office of Inspector General
42 CFR Parts 1003 and 1005
RIN 0936-AA09
Grants, Contracts, and Other Agreements: Fraud and Abuse;
Information Blocking; Office of Inspector General's Civil Money Penalty
Rules
AGENCY: Office of Inspector General (OIG), Department of Health and
Human Services (HHS).
ACTION: Final rule.
-----------------------------------------------------------------------
SUMMARY: This final rule amends the civil money penalty (CMP)
regulations of the Department of Health and Human Services (HHS) Office
of Inspector General (OIG) to: incorporate new CMP authority for
information blocking; incorporate new authorities for CMPs,
assessments, and exclusions related to HHS grants, contracts, other
agreements; and increase the maximum penalties for certain CMP
violations.
DATES: This final rule is effective August 2, 2023, except for the
additions of Sec. Sec. 1003.1400, 1003.1410, and 1003.1420 (amendatory
instruction 10), which are effective on September 1, 2023.
FOR FURTHER INFORMATION CONTACT: Robert Penezic, (202) 539-4021,
[email protected].
SUPPLEMENTARY INFORMATION:
I. Executive Summary
A. Purpose and Need for Regulatory Action
This final rule implements three statutory provisions: (1) the
amendment of the Public Health Service Act (PHSA), 42 U.S.C. 300jj-52,
by the 21st Century Cures Act (Cures Act) authorizing OIG to
investigate claims of information blocking and providing the Secretary
of HHS (Secretary) authority to impose CMPs for information blocking;
(2) the amendment of the Civil Monetary Penalties Law (CMPL), 42 U.S.C.
1320a-7a, by the Cures Act, Public Law 114-255, section 5003,
authorizing HHS to impose CMPs, assessments, and exclusions upon
individuals and entities that engage in fraud and other misconduct
related to HHS grants, contracts, and other agreements (42 U.S.C.
1320a-7a(o)-(s)); and (3) the increase in penalty amounts in the CMPL
effected by the Bipartisan Budget Act of 2018 (BBA 2018), Public Law
115-123. Each of these statutory amendments is discussed further below.
First, section 4004 of the Cures Act added section 3022 to the
PHSA, 42 U.S.C. 300jj-52 which, among other provisions, provides OIG
the authority to investigate claims of information blocking and
authorizes the Secretary to impose CMPs against a defined set of
individuals and entities that OIG determines committed information
blocking. Investigating and taking enforcement action against
individuals and entities that engage in information blocking are
consistent with OIG's history of investigating serious misconduct that
impacts HHS programs and beneficiaries. Information blocking poses a
threat to patient safety and undermines efforts by providers, payers,
and others to make the health system more efficient and effective.
Information blocking may also constitute an element of a fraud scheme,
such as by forcing unnecessary tests or conditioning information
exchange on referrals. Addressing the negative effects of information
blocking is consistent with OIG's mission to protect the integrity of
HHS programs, as well as the health and welfare of program
beneficiaries.
In this final rule, we implement section 3022(b)(2)(C) of the PHSA,
which requires that the CMP for information blocking follow the
procedures of section 1128A of the Social Security Act (SSA).
Specifically, the final rule adds the information blocking CMP
authority to the existing regulatory framework for the imposition and
appeal of CMPs, assessments, and exclusions (42 CFR parts 1003 and
1005) pursuant to section 3022(b)(2)(C) of the PHSA (42 U.S.C. 300jj-
52(b)(2)(C)). The amendments give individuals and entities subject to
CMPs for information blocking the same procedural rights that currently
exist under 42 CFR parts 1003 and 1005. Through this final rule, we
codify this new information blocking authority at 42 CFR 1003.1400,
1003.1410, and 1003.1420.
The final rule also explains OIG's approach to enforcement, which
will focus on information blocking allegations that pose greater risk
to patients, providers, and health care programs, as well as OIG's
anticipated consultation and coordination with the Office of the
National Coordinator for Health Information Technology (ONC) and other
agencies, as appropriate, in reviewing and investigating allegations of
information blocking.
On May 1, 2020, ONC published a final rule, 21st Century Cures Act:
Interoperability, Information Blocking, and the ONC Health IT
Certification Program (ONC Final Rule), in the Federal Register. 85 FR
25642, May 1, 2020. Among other things, ONC through the ONC Final Rule
promulgated the information blocking regulations defining information
blocking and establishing exceptions to that definition. OIG's final
rule incorporates the relevant information blocking regulations at 45
part 171 as the basis for imposing CMPs for information blocking.
Second, this final rule modifies 42 CFR parts 1003 and 1005 to add
the new authority related to fraud and other misconduct involving
grants, contracts, and other agreements into the existing regulatory
framework for the imposition and appeal of CMPs, assessments, and
exclusions. The additions: (1) expressly enumerate in the regulation
the grant, contract, and other agreement fraud and misconduct CMPL
authority; and (2) give individuals and entities sanctioned for fraud
and other misconduct related to HHS grants, contracts, and other
agreements the same procedural and appeal rights that currently exist
under 42 CFR parts 1003 and 1005 for those sanctioned under the CMPL
and other statutes for fraud and other misconduct related to, among
other things, the Federal health care programs. In this final rule, we
codify these new authorities and their corresponding sanctions in the
regulations at 42 CFR 1003.110, 1003.130, 1003.140, 1003.700, 1003.710,
1003.720, 1003.1550, 1003.1580, and 1005.1.
On February 9, 2018, the President signed into law the BBA 2018.
Section 50412 of the BBA 2018 amended the CMPL to increase the amounts
of certain CMPs. 42 U.S.C. 1320a-7a(a), (b). This final rule codifies
the increased CMPs at 42 CFR part 1003. Specifically, for conformity
with the CMPL as amended by the BBA 2018, we revise the CMPs contained
at 42 CFR 1003.210, 1003.310, and 1003.1010.
B. Legal Authority
The legal authority for this regulatory action is found in the SSA
and the PHSA, as amended by the Cures Act and the BBA 2018. The legal
authority for the changes is listed by the parts of title 42 of the
Code of Federal Regulations (CFR) that we propose to modify:
1003: 42 U.S.C. 1320a-7a(a)-(b), (o)-(s); 42 U.S.C. 300jj-52
1005: 42 U.S.C. 1320a-7a(o)-(s); 42 U.S.C. 300jj-52
C. Proposed Rule
On April 24, 2020, OIG published a proposed rule (proposed pule) in
the Federal Register setting forth certain proposed amendments to the
CMP rules of HHS OIG. 85 FR 22979, April 24, 2020. The proposed rule
set forth
[[Page 42821]]
proposed regulations that would: (1) incorporate the new CMP authority
for information blocking; (2) incorporate new authorities for CMPs,
assessments, and exclusions related to HHS grants, contracts, other
agreements; and (3) increase the maximum penalties for certain CMP
violations. We solicited comments on those three proposed regulatory
additions and changes to obtain public input. Specific to information
blocking, we also provided information on--but did not propose
regulations for--our expected enforcement priorities, the investigation
process, and our experience with investigating conduct that includes an
intent element. We received 49 timely comments, 48 of which were
unique, from a broad range of stakeholders.
D. Final Rule
This final rule incorporates into OIG's CMP regulations at 42 CFR
parts 1003 and 1005 two new CMP authorities established by the Cures
Act related to: (1) information blocking; and (2) fraud and other
misconduct involving HHS grants, contracts, and other agreements. The
final rule also incorporates into 42 CFR part 1003 new maximum CMP
amounts for certain offenses, as set by the BBA 2018.
In the context of information blocking, the Cures Act authorizes
CMPs for any practice that is likely to interfere with, prevent, or
materially discourage access, exchange, or use of electronic health
information (EHI) if the practice is conducted by an entity that is: a
developer of certified health information technology (IT); offering
certified health IT; a health information exchange (HIE); or a health
information network (HIN) and the entity knows or should know that the
practice is likely to interfere with, prevent, or materially discourage
the access, exchange, or use of EHI.
The ONC Final Rule implements certain Cures Act information
blocking provisions, including defining terms and establishing
reasonable and necessary activities that do not constitute information
blocking or ``exceptions'' to the definition of information blocking.
OIG and ONC have coordinated extensively on the ONC Final Rule and this
final rule to align both sets of regulations. As proposed, we
incorporate the regulatory definitions and exceptions in ONC's
regulations at 45 CFR part 171 related to information blocking as the
basis for imposing CMPs and determining the amount of penalty imposed.
In the context of HHS grants, contracts, and other agreements, the
Cures Act authorizes CMPs, assessments, and exclusions for:
knowingly presenting or causing to be presented a
specified claim under a grant, contract, or other agreement that a
person knows or should know is false or fraudulent;
knowingly making, using, or causing to be made or used any
false statement, omission, or misrepresentation of a material fact in
any application, proposal, bid, progress report, or other document that
is required to be submitted in order to directly or indirectly receive
or retain funds provided in whole or in part by HHS pursuant to a
grant, contract, or other agreement;
knowingly making, using, or causing to be made or used, a
false record or statement material to a false or fraudulent specified
claim under a grant, contract, or other agreement;
knowingly making, using, or causing to be made or used, a
false record or statement material to an obligation to pay or transmit
funds or property to HHS with respect to a grant, contract, or other
agreement;
knowingly concealing or knowingly and improperly avoiding
or decreasing an obligation to pay or transmit funds or property to HHS
with respect to a grant, contract, or other agreement; and
failing to grant timely access, upon reasonable request,
to OIG for the purposes of audits, investigations, evaluations, or
other statutory functions of OIG in matters involving grants,
contracts, or other agreements.
We further codify changes to the CMP regulations at 42 CFR part
1003 to conform with the CMP amounts contained in the SSA, as amended
by the BBA 2018.
II. Background
For more than 35 years, OIG has exercised authority to impose CMPs,
assessments, and exclusions in furtherance of its mission to protect
Federal health care and other Federal programs from fraud, waste, and
abuse. The Cures Act established new CMP authorities related both to
information blocking and to fraud and other prohibited conduct
involving HHS grants, contracts, and other agreements. OIG also
received authority through the BBA 2018 to impose larger CMPs for
certain offenses committed after February 9, 2018.
A. Overview of OIG Civil Money Penalty Authorities
The CMPL (section 1128A of the SSA, 42 U.S.C. 1320a-7a) was enacted
in 1981 to provide HHS with the statutory authority to impose CMPs,
assessments, and exclusions upon persons who commit fraud and other
misconduct related to Federal health care programs, including Medicare
and Medicaid. The Secretary delegated the CMPL's authorities to OIG. 53
FR 12993, April 20, 1988. HHS has promulgated regulations at 42 CFR
parts 1003 and 1005 that: (1) enumerate specific bases for the
imposition of CMPs, assessments, and exclusion under the CMPL and other
CMP statutes; (2) set forth the appeal rights of persons subject to
those sanctions; and (3) outline the procedures under which a
sanctioned party may appeal the sanction. Since 1981, Congress has
created various other CMP authorities related to fraud and abuse that
were delegated by the Secretary to OIG and added to part 1003.
B. The Cures Act and the ONC Final Rule
The Cures Act added section 3022 of the PHSA, which defines conduct
that constitutes information blocking by health IT developers of
certified health IT, entities offering certified health IT, HIEs, HINs,
and health care providers. Section 3022(a) of the PHSA defines
information blocking as a practice that--(A) except as required by law
or specified by the Secretary pursuant to rulemaking under section
3022(a)(3), is likely to interfere with, prevent, or materially
discourage access, exchange, or use of electronic health information;
and (B)(i) if conducted by a health information technology developer,
exchange, or network, such developer, exchange, or network knows, or
should know, that such practice is likely to interfere with, prevent,
or materially discourage the access, exchange, or use of electronic
health information; or (ii) if conducted by a health care provider,
such provider knows that such practice is unreasonable and is likely to
interfere with, prevent, or materially discourage access, exchange, or
use of electronic health information. Section 3022(a)(3) of the PHSA
provides that the Secretary shall, through rulemaking, identify
reasonable and necessary activities that do not constitute information
blocking, and section 3022(a)(4) of the PHSA states that the term
``information blocking'' does not include any conduct that occurred
before January 13, 2017. The ONC Final Rule implements these sections
of the PHSA at 45 CFR part 171.
Section 3022(b)(1) of the PHSA authorizes OIG to investigate claims
of information blocking described in section 3022(a) of the PHSA, and
to investigate claims that health IT developers of certified health IT
or other
[[Page 42822]]
entities offering certified health IT have submitted false attestations
under section 3001(c)(5)(D) of the PHSA as part of ONC's program for
the voluntary certification of health IT (ONC Health IT Certification
Program). Section 3022(b)(2)(A) authorizes the Secretary to impose CMPs
not to exceed $1 million per violation on health IT developers of
certified health IT or other entities offering certified health IT,
HIEs, and HINs that OIG determines, following an investigation,
committed information blocking. Section 3022(b)(2)(A) also provides
that a determination of the CMP amounts shall consider factors such as
the nature and extent of the information blocking and harm resulting
from such information blocking including, where applicable, the number
of patients affected, the number of providers affected, and the number
of days the information blocking persisted. Section 3022(b)(2)(C) of
the PHSA applies the procedures of section 1128A of the SSA to CMPs
imposed under section 3022(b)(2) of the PHSA in the same manner as such
provisions apply to a CMP or proceeding under section 1128A(a) of the
SSA. This final rule implements section 3022(b)(2)(A) and (C) of the
PHSA.
Furthermore, section 3022(b)(2)(B) of the PHSA provides that any
health care provider determined by OIG to have committed information
blocking shall be referred to the appropriate agency to be subject to
appropriate disincentives using authorities under applicable Federal
law, as the Secretary of HHS sets forth through notice and comment
rulemaking. This final rule does not implement section 3022(b)(2)(B) of
the PHSA. However, a health IT developer of certified health IT, HIE,
or HIN as defined in 45 CFR 171.102 determined by OIG to have committed
information blocking could be subject to CMPs under this final rule
even if that entity also met the definition of a health care provider
at 45 CFR 171.102. For additional discussion related to health care
providers that meet a definition of an actor subject to CMPs, see
section IV.A.3. of this preamble.
The Cures Act also identifies ways for ONC, the Office for Civil
Rights (OCR), and OIG to consult, refer, and coordinate. For example,
section 3022(b)(3) of the PHSA states that OIG may refer instances of
information blocking to OCR when a consultation regarding the health
privacy and security rules promulgated under section 264(c) of the
Health Insurance Portability and Accountability Act of 1996 (HIPAA)
will resolve such information blocking claims. Additionally, section
3022(d)(1) of the PHSA requires ONC to share information with OIG as
required by law. For additional discussion related to coordination, see
section III.A.5 of the proposed rule preamble and section III.B. of
this preamble.
ONC's information blocking regulations at 45 CFR part 171 and the
OIG CMP regulation at 42 CFR part 1003, subpart N, are designed to work
in tandem. As a result, we encourage parties to read this final rule
together with the ONC Final Rule. The ONC Final Rule defined
``information blocking''--and specific terms related to information
blocking--as well as implemented exceptions to the definition of
information blocking. This final rule describes the parameters and
procedures applicable to the CMP for information blocking.
The Cures Act amended the CMPL to give HHS the authority to impose
CMPs, assessments, and exclusions upon persons that commit fraud and
other misconduct related to HHS grants, contracts, and other
agreements. 42 U.S.C. 1320a-7a(o)-(s). This authority allows for the
imposition of sanctions for a wide variety of fraudulent and improper
conduct involving HHS grants, contracts, and other agreements
including, among other things, the making of false or fraudulent
specified claims to HHS, the submission of false or fraudulent
documents to HHS, and the creation of false records related to HHS
grants, contracts, or other agreements. The authority applies to a
broad array of situations in which HHS provides funding, directly or
indirectly, in whole or in part, pursuant to a grant, contract, or
other agreement. The Cures Act also created a new set of definitions
related to grant, contract, and other agreement fraud and misconduct,
outlined the sanctions for violation of the statute, and referenced the
procedures to be used when imposing sanctions under the statute.
C. The Bipartisan Budget Act of 2018
The BBA 2018 amended the CMPL to increase certain CMP amounts
contained in 42 U.S.C. 1320a-7a(a) and (b). The BBA 2018 increased the
maximum CMP amounts in section 1128A(a) of the SSA (42 U.S.C. 1320a-7a)
from $10,000 to $20,000; from $15,000 to $30,000; and from $50,000 to
$100,000. The BBA 2018 increased the maximum CMP amounts in section
1128A(b) of the SSA from $2,000 to $5,000 in paragraph (1), from $2,000
to $5,000 in paragraph (2), and from $5,000 to $10,000 in paragraph
(3)(A)(i). This statutory increase in CMP amounts is effective for acts
committed after the date of enactment, February 9, 2018. This final
rule updates our regulations to reflect the increased CMP amounts
authorized by the 2018 BBA amendments.
III. OIG's Anticipated Approach to Information Blocking CMP Enforcement
The preamble to the proposed rule provided a nonbinding,
informational overview of our anticipated information blocking
enforcement priorities and the investigative process. We provided this
information in the preamble to the proposed rule for informational
purposes only and did not propose regulations on these topics. We
received several comments on these topics, which are publicly available
at https://www.regulations.gov/docket/HHSIG-2020-0001/comments. To
improve public understanding of how we anticipate we will approach
information blocking CMP enforcement, we further provide in section III
of this preamble an informational statement to supplement the
discussion set forth in the proposed rule. We note that this discussion
of anticipated approach is limited to our investigation of those
entities subject to CMPs and does not apply to the investigation of
health care providers that may be referred for disincentives under
section 3022(b)(2)(B) of the PHSA.
A. Anticipated Priorities
The preamble to the proposed rule set forth our anticipated
information blocking enforcement priorities as conduct that: (1)
resulted in, is causing, or had the potential to cause patient harm;
(2) significantly impacted a provider's ability to care for patients;
(3) was of long duration; (4) caused financial loss to Federal health
care programs, or other government or private entities; or (5) was
performed with actual knowledge. We explained that we will select cases
for investigation based on these priorities and expect that the
enforcement priorities will evolve as OIG gains more experience
investigating information blocking. We also emphasized that the
definition of information blocking--as defined in section 3022(a) of
the PHSA and 45 CFR 171.103(a)--includes an element of intent and that
OIG lacked the authority to seek CMPs for information blocking against
actors who did not have the requisite intent. We continue to anticipate
the same enforcement priorities as set out in the preamble of the
proposed rule and supplement that discussion below. We provide this
explanation so that the public and stakeholders have a better
understanding of how we anticipate allocating our resources to enforce
the
[[Page 42823]]
CMP for information blocking. Prioritization ensures OIG can
effectively allocate its resources to target information blocking
allegations that have more negative effects on patients, providers, and
health care programs. Our enforcement priorities will inform our
decisions about which information blocking allegations to pursue, but
these priorities are not dispositive. Each allegation will present
unique facts and circumstances that must be assessed individually. Each
allegation will be assessed to determine whether it implicates one or
more of the enforcement priorities, or otherwise merits further
investigation and potential enforcement action. There is no specific
formula we can apply to every allegation that allows OIG to effectively
evaluate and prioritize which claims merit investigation.
As addressed in section III.B of this preamble, we anticipate
coordinating closely with ONC and other agencies as appropriate in
reviewing allegations. Although our statement of anticipated priorities
is framed around individual allegations, OIG may evaluate allegations
and prioritize investigations based in part on the volume of claims
relating to the same (or similar) conduct by the same actor. That
evaluation would include assessment of all information blocking claims
received by ONC through the standardized process to receive claims from
the public.
We clarify here that OIG's anticipated priority relating to patient
harm is not specific to individual harm, but rather may broadly
encompass harm to a patient population, community, or the public.
Additionally, with respect to our anticipated priority relating to
actual knowledge, we note that health IT developers of certified health
IT and health information exchanges and networks do not have to have
actual knowledge in order to commit information blocking. But the
conduct of someone who has actual knowledge is generally more egregious
than the conduct of someone who only should know that their practice is
likely to interfere with, prevent, or materially discourage access,
exchange, or use of EHI. As a general matter, we would likely
prioritize cases in which an actor has actual knowledge over cases in
which the actor only should have known that the practice was likely to
interfere with, prevent, or materially discourage the access, exchange,
or use of EHI.
Finally, we are stating that our current anticipated enforcement
priorities may lead to investigations of anti-competitive conduct or
unreasonable business practices. The ONC Final Rule provides, as
examples, conduct that may implicate the information blocking
provision, anti-competitive or unreasonable conduct, such as
unconscionable or one-sided business terms for the access, exchange, or
use of EHI, or the licensing of an interoperability element. For
example, a contract containing unconscionable terms related to sharing
of patient data could be anti-competitive conduct that impedes a
provider's ability to care for patients. 85 FR 25812, May 1, 2020. A
claim of such conduct would implicate OIG's enforcement priority
related to a provider's ability to care for patients. Anti-competitive
conduct resulting in information blocking could implicate other
enforcement priorities as well, depending on the facts.
OIG's enforcement priorities are a tool we use to triage
allegations and allocate resources. We can and do expect to investigate
allegations of other information blocking conduct not covered by the
priorities. If conduct or patterns of conduct raise concerns, OIG may
choose to investigate those allegations. And as we gain more experience
with investigating information blocking, we will reassess our
priorities accordingly. For example, as patients continue to adopt and
use technology to access their EHI, the number of patients that will
request their EHI directly from a health IT developer of certified
health IT or HIE may increase. That may generate more allegations
related to patient access to their EHI. Trends or changes in the types
of allegations we receive may affect enforcement priorities in the
future.
B. Coordination With Other Agencies
The Cures Act identified ways for ONC, OCR, and OIG to consult,
refer, and coordinate on information blocking claims. We elaborate on
those processes here for informational purposes only.
Section 3022(d)(1) of the PHSA states that ONC may serve as a
technical consultant to OIG. Because ONC promulgated the information
blocking regulations and exceptions, OIG will closely consult with ONC
throughout the investigative process. ONC's subject matter expertise is
vital to our evaluation of information blocking allegations. OIG will
continue working closely with ONC as ONC develops information blocking
guidance.
Section 3022(d)(3) of the PHSA requires ONC to implement a
standardized process for the public to submit reports on claims of
information blocking, and section 3022(d)(1) requires ONC to share
information with OIG as required by law. ONC has a standardized process
for the public to submit reports on claims of information blocking
through this website: https://inquiry.healthit.gov/support/plugins/servlet/desk/portal/6. In addition to the process required by the PHSA,
OIG has its own hotline process through which individuals may submit
claims of information blocking online at https://tips.oig.hhs.gov/ or
by calling 1-800-447-8477. Regardless of whether a claim is made to ONC
or OIG, ONC and OIG will coordinate in evaluating claims of information
blocking and share information as permitted by law.
Whether OIG's or ONC's authority is appropriate to address a claim
of information blocking will depend on the facts and circumstances of
the allegation and the results of an investigation. For example, ONC
and OIG may initially agree that a claim is most appropriately
evaluated through an OIG investigation. ONC has authority to take
action against an individual or entity that is a developer
participating in the ONC Health IT Certification Program. 45 CFR
170.580. OIG has authority to impose CMPs against a health IT developer
of certified health IT, which includes developers participating in the
ONC Health IT Certification Program. Thus, an individual or entity that
meets the definition of health IT developer of certified health IT
could be subject to CMPs, termination of certification or other action
under the ONC Health IT Certification Program review process, or both.
85 FR 25789, May 1, 2020.
In addition to coordination with ONC, section 3022(b)(3) of the
PHSA provides the option for OIG to refer instances of information
blocking to OCR when a consultation regarding the health privacy and
security rules promulgated under section 264(c) of HIPAA will resolve
such information blocking claims. Depending on the facts and
circumstances of an information blocking claim, OIG will exercise this
statutory discretion as appropriate to refer persons to consult with
OCR to resolve information blocking claims. There is no set of facts or
circumstances that will always be referred to OCR. OIG will work with
OCR to determine which claims should be referred to OCR under the new
authorities found in section 3022(b)(3) of the PHSA. In addition to
section 3022(b)(3), OIG may request technical assistance from OCR
during an information blocking investigation. OIG may also refer to OCR
claims of information blocking that would be better resolved under
OCR's HIPAA authorities.
Specific to anti-competitive conduct, we note that section 3022(d)
of the PHSA includes specific options for ONC
[[Page 42824]]
and OIG to coordinate with the Federal Trade Commission (FTC) related
to an information blocking claim. Under section 3022(d)(1) of the PHSA,
ONC may share information related to claims of information blocking or
investigations by OIG with the FTC for purposes of such investigation.
We will coordinate closely with ONC to identify claims and
investigations or patterns of claims and investigations that may
warrant referral to the FTC.
We further note that following our investigation and the imposition
of CMPs, our coordination with ONC, OCR, or other agencies as relevant
may continue as part of an appeal of the imposition of CMPs by OIG.
Upon the issuance of a notice of proposed determination for a CMP in
accordance with 42 CFR 1003.1500, the actor may appeal the proposed
determination for a CMP in accordance with the appeal procedures set
forth in 42 CFR part 1005. As noted in 42 CFR 1005.2(a), a party
sanctioned under any criteria in 42 CFR part 1003 may request a hearing
before an administrative law judge (ALJ). 42 CFR 1005.2. The facts of
the matter under appeal will determine the specific agencies with which
we may coordinate.
We also anticipate coordinating with other HHS agencies to avoid
duplicate penalties. Section 3022(d)(4) of the PHSA requires that the
Secretary, to the extent possible, ensure that penalties do not
duplicate penalty structures that would otherwise apply to information
blocking and the type of individual or entity involved as of the day
before the enactment of the Cures Act, December 13, 2016. Depending on
the facts and circumstances, OIG might also consult or coordinate with
a range of other agencies that might have relevant information or be
able to provide technical assistance, including the Centers for
Medicare and Medicare Services (CMS), other HHS agencies, FTC, or
others. We discuss what enforcement coordination may look like in
section III.D of the preamble.
C. Anticipated Enforcement Approach
Some commenters expressed interest in understanding OIG's
enforcement approach, including: (1) whether OIG would include
alternative actions, in lieu of the imposition of CMPs, such as
providing actors subject to CMPs with additional education or
corrective action plans; (2) whether OIG's approach to information
blocking investigations would include investigating potential non-
compliance with the requirements of CMS's Promoting Interoperability
Program for eligible hospitals and critical access hospitals (CAHs) and
Merit-based Incentive Payment System (MIPS) promoting interoperability
performance category for clinicians; (3) whether actors may be subject
to False Claims Act (FCA) liability for engaging in conduct that
constitutes information blocking; and (4) whether OIG plans to create a
self-disclosure protocol (SDP).
At this point, we do not anticipate using alternatives to CMPs as
described by the commenters. OIG will have an SDP to resolve CMP
liability and allow for lower penalties. As we gain more experience
investigating and imposing CMPs for information blocking, we may
further consider alternative enforcement approaches. HHS or OIG may
also consider issuance of compliance guidance or other educational
materials on the topic of information blocking.
OIG's historical position in its administrative enforcement under
the CMPL is that the Federal health care programs are best protected
when persons who engage in fraudulent or other improper conduct are
assessed a financial sanction. This remedial purpose is at the core of
OIG's administrative enforcement authorities.
The PHSA and existing regulatory structures provide options for ONC
and OCR to conduct individualized education and corrective action plans
when an actor has committed information blocking, and OIG may refer
matters to ONC or OCR for such actions. For example, OIG may refer an
allegation to OCR for consultation regarding the health privacy and
security rules or for OCR to address under its HIPAA authorities.
Similarly, OIG may refer an allegation to ONC to address under its
direct review authority, under which ONC could impose a corrective
action plan. ONC also stated in the ONC Final Rule that ONC's and OIG's
respective authorities are independent and that either office may
exercise its authority at any time. 85 FR 25789, May 1, 2020. Thus,
OIG's enforcement action will only include a CMP, while ONC could purse
a separate enforcement action within its authority, which could include
a corrective action plan.
As noted above, this rulemaking does not address OIG investigations
of potential information blocking by healthcare providers. HHS is
developing a separate notice of proposed rulemaking to establish
appropriate disincentives for healthcare providers as described in the
Unified Agenda at https://www.reginfo.gov/public/do/eAgendaViewRule?pubId=202210&RIN=0955-AA05. However, in response to
commenters' inquiry we clarify that OIG does not intend to use its
authority to investigate information blocking under section 3022(b)(1)
of the PHSA to investigate potential non-compliance with CMS
programmatic requirements, including those under the Promoting
Interoperability Program for eligible hospitals and CAHs and MIPS
promoting interoperability performance category for clinicians, that
are distinct from the information blocking provisions of the PHSA. If
investigations into alleged information blocking suggest a health care
provider may be out of compliance with CMS programmatic requirements,
OIG may refer such matters to CMS.
Similarly, conduct that constitutes information blocking could
create false claims liability for an actor. For example, by engaging in
conduct that constitutes information blocking, a health IT developer of
certified health IT may have falsified attestations made to ONC as part
of the ONC Health IT Certification Program. By falsifying its
attestation, the health IT developer of certified health IT may cause
health care providers to file false attestations under MIPS. Such a
fact-specific determination would be assessed in coordination with
OIG's law enforcement partners, including the Department of Justice.
Information blocking is newly regulated conduct, and OIG has not
created an SDP specifically for information blocking; however, after
the publication of this rule, OIG will add an information blocking SDP,
including an online submission form, and other processes, to OIG's
existing SDP located at https://oig.hhs.gov/compliance/self-disclosure-info/.
We understand many stakeholders may not be familiar with OIG's
current SDP and provide the following information regarding the
forthcoming information blocking SDP and self-disclosure process. The
information blocking SDP will provide actors with a framework and
mechanism for evaluating, disclosing, coordinating, and resolving CMP
liability for conduct that constitutes information blocking. When
posted on our website, OIG's SDP will explain: (1) eligibility
criteria, (2) manner and format, (3) required contents of a submission,
and (4) expected resolution of the matter. The information blocking SDP
will be available only to those actors seeking to resolve potential CMP
liability.
We recognize that whether to disclose potential information
blocking violations to OIG is a significant decision; however, the
significant benefits to disclosing potential information blocking
violations to OIG should make that decision easier. First,
[[Page 42825]]
actors accepted by OIG into the SDP who cooperate with OIG during the
self-disclosure process will pay lower damages than would normally be
required in resolving a government-initiated investigation. Second,
through our experience with OIG's existing SDP, we know that self-
disclosure provides the opportunity for an actor to avoid costs and
disruptions associated with government-directed investigations and
civil or administrative litigation. Finally, OIG created the original
SDP to provide a consistent, specific, and detailed process that can be
relied upon by all participants, and we are similarly committed to
working with actors that use the SDP in good faith to disclose
information blocking conduct and cooperate with OIG's review and
resolution process.
We reiterate that self-disclosing conduct is for an actor to
resolve its own potential liability under the CMP for information
blocking. It would not resolve any liability an actor may have under
other applicable law, such as under HIPAA or under the ONC
Certification Program. Actors should not self-disclose to seek opinions
from OIG as to whether an individual or entity meets the definitions of
a ``health IT developer of certified health IT'' or ``health
information network or health information exchange'' in 45 CFR 171.102
or whether conduct constitutes information blocking under section
3022(a) of the PHSA and corresponding implementing regulations. Actors
seeking to inform OIG about another individual's conduct should use the
ONC portal or the OIG hotline.
As mentioned above, OIG will provide additional information on our
website regarding the SDP for information blocking after publication of
this final rule. However, before such information is posted, OIG will
accept self-disclosure of information blocking conduct. We refer actors
to section IV.A.5 of the preamble that describes how we will evaluate
disclosure of violations and cooperation with investigations.
Specifically, it is a mitigating circumstance under the factors at
42 CFR 1003.140(a)(2) for an actor to take appropriate and timely
corrective action in response to a violation. Timely corrective action
includes disclosing information blocking violations to OIG and fully
cooperating with OIG's review and resolution of such disclosure.
D. Advisory Opinions
Some commenters requested that OIG develop an advisory opinion
process for individuals and entities to obtain advisory opinions on
whether specified conduct constitutes information blocking for which
OIG may impose a CMP. Pursuant to section 1128D(b) of the SSA, HHS,
through OIG, publishes advisory opinions regarding the application of
the Federal anti-kickback statute and the associated safe harbor
provisions, as well as specified administrative sanction authorities,
to proposed or existing arrangements. Section 1128D(b) specifies the
matters subject to advisory opinions under that authority. The CMP for
information blocking is not one of the administrative sanction
authorities specified by section 1128D(b) of the SSA.
Furthermore, the Cures Act did not establish an advisory opinion
process with regard to the application of OIG's information blocking-
related administrative enforcement authorities. At present, OIG has no
plans to develop and establish an advisory opinion process regarding
the application of the CMP for information blocking. The Justification
of Estimates to the Appropriations Committee for the President's fiscal
year (FY) 2024 budget included a legislative proposal to provide HHS
the authority to issue advisory opinions on information blocking
practices.
IV. Summary of Final Rule Provisions, Public Comments, and OIG Response
A. The CMP for Information Blocking
As a general matter, commenters were supportive of OIG's proposed
information blocking rules but sought more information and guidance
from both ONC and OIG. Commenters suggested that the effective date for
the CMP for information blocking rules be delayed as a result of the
ongoing public health emergency (PHE) due to SARS-CoV-2, which causes
COVID-19, and the requests for additional guidance from ONC and OIG.
Many commenters sought clarification on the ONC Final Rule, such as
whether an individual or entity falls within the category of actors
that OIG would subject to CMPs for information blocking. Many
commenters requested that OIG, either in this final rule or through
guidance, further elaborate on and provide examples of how OIG will
determine violations and CMP amounts. We have considered these comments
carefully in developing the final rule, as described in more detail in
responses to comments.
1. Information Blocking CMP Regulatory Authority & CMP Process
We proposed to add the CMP for information blocking to our existing
CMP regulations at 42 CFR part 1003 and to apply the existing
procedural and appeal rights at 42 CFR parts 1003 and 1005 to the CMP
for information blocking. We solicited comment on the proposed
application of the existing CMP procedures and appeal process in parts
1003 and 1005 to the CMP for information blocking. Commenters were
generally in favor of incorporating the CMP for information blocking
into these sections and applying the existing appeal processes set
forth at 42 CFR part 1005. In this rule, we finalize the addition of
the CMP for information blocking to 42 CFR part 1003 and the
application of parts 1003 and 1005 to the CMP for information blocking
as proposed without modification.
We also proposed to add the authority for OIG's imposition of CMPs
for information blocking (section 3022 of the PHSA, 42 U.S.C. 300jj-52)
to the list of statutory CMP provisions that appears in 42 CFR
1003.100. We received no comment on this proposed change and finalize
the rule as proposed without modification.
Comment: One commenter believed that the application of 42 CFR
1005.7 to the CMP for information blocking was unworkable in its
current form. The commenter believed that the discovery process under
42 CFR 1005.7 as currently written was inconsistent with the Cures
Act's intent for ONC, OCR, and OIG to consult, refer, and coordinate in
the investigation and enforcement of investigation blocking. The
commenter further stated that, consistent with the prior OIG final
rule, Amendments to the OIG Exclusion and CMP Authorities Resulting
From Public Law 100-93, 57 FR 3325, January 29, 1992, OIG would only be
required to produce documents in its possession and not documents in
the possession of other branches or divisions of HHS. The commenter
further believed 42 CFR 1005.7 as written would prohibit individuals
and entities that appeal the imposition of CMPs for information
blocking from obtaining relevant documentary evidence maintained in
ONC's possession. The commenter also believed that OIG could abuse the
discovery process by refusing to take ``possession'' of documents in
ONC's care, custody, or control in an effort to avoid producing them.
The commenter further believed that, as ONC would not be covered by the
discovery rule at 42 CFR 1005.7, ONC would not be subject to any
document preservation requirement that would increase the potential for
the spoliation or destruction of evidence.
Response: We did not propose revising--and this final rule does not
make revisions to--42 CFR 1005.7. The
[[Page 42826]]
CMP for information blocking appeals will be subject to discovery rules
in 42 CFR 1005.7 because the Cures Act requires OIG to follow existing
CMP procedures. Section 3022(b)(2)(C) of the PHSA requires the CMP for
information blocking to follow procedures of section 1128A of the SSA,
and 42 CFR part 1005 implements those procedures. Therefore, applying
the procedures at 42 CFR part 1005 to CMP for information blocking
appeals is consistent with the Cures Act.
We appreciate that the CMP appeals process and the discovery
provided therein may be new for many actors subject to CMPs for
information blocking, and we further elaborate below.
Whenever we propose to impose CMPs for information blocking, the
actor will have the opportunity to appeal the CMPs. That appeal will be
heard by an administrative law judge (ALJ) and governed by the
procedures set forth in 42 CFR part 1005. The regulation at 42 CFR
1005.7 addresses discovery and allows each party to request that the
other party produce nonprivileged documents that are relevant and
material to the issues before the ALJ for inspection and copying. If
the other party objects to producing the requested documents, the party
requesting the documents can ask the ALJ to compel discovery.
The discovery regulations that will apply to appeals of CMPs for
information blocking are the same regulations that have applied to
existing CMPL administrative litigation. These regulations and this
process have been approved by administrative tribunals and Federal
courts. We provide limited discovery in our CMP cases even though it is
not required in administrative proceedings at all. 57 FR 3298, January
29, 1992. The regulation at 42 CFR 1005.7 limits discovery to the
exchange of material and relevant documents to avoid the time-consuming
discovery fights that can affect civil litigation. Additionally, the
vast bulk of material and relevant evidence (i.e., evidence relating to
whether the actor committed information blocking) will come from the
actor whose conduct is at issue and not the government.
In addition to the specific discovery rules in 42 CFR 1005.7, there
are other provisions in 42 CFR part 1005 that ensure transparency and
fairness in an appeal. For example, 42 CFR 1005.8 calls for the parties
to exchange witness lists, copies of prior written statements of
proposed witnesses, and copies of proposed hearing exhibits. If OIG
proposed to use documents or testimony from ONC or other government
agencies as evidence in support of the imposition of CMPs, those
exhibits and statements would be made available under 42 CFR 1005.8.
Regarding the commenter's specific concern that 42 CFR 1005.7 is
not consistent with the coordination with ONC and OCR suggested by the
Cures Act, we do not agree. The Cures Act provides OIG the
discretionary authority to coordinate or consult with ONC and OCR, as
necessary. For example, under section 3022(b)(3)(A) of the PHSA, OIG
``may refer'' instances of information blocking to OCR if we determine
that consulting with OCR may resolve an information blocking claim.
While not required, we expect that nearly all information blocking
investigations will be done in coordination with ONC. This close
coordination with another HHS agency is not unique to information
blocking or the Cures Act. Many of our CMP cases involve similarly
close coordination with CMS, for example. There is nothing unique to
the Cures Act that would necessitate a change from our current
discovery procedures.
We do not agree with the commenter's concerns about spoliation or
destruction of documents in ONC's possession. ONC would not be a party
to discovery in a CMP for information blocking matter, so the concept
of spoliation--at least as the term is used in civil litigation--would
be inapplicable. Regardless, as a part of the Federal Government ONC is
subject to regulations and policies governing document maintenance and
retention, including those promulgated by the National Archives and
Records Administration.
Comment: Some commenters expressed interest in more information
about documentation and record retention requirements. They wanted to
understand how to demonstrate compliance with an information blocking
exception.
Response: We did not propose and are not finalizing a record
retention requirement specific to the CMP for information blocking.
Furthermore, this final rule does not provide additional guidance
regarding which documents are required to demonstrate compliance with
an ONC exception for information blocking because that is outside the
scope of this rule and OIG's authority. OIG will consider any
documentation provided by an actor during an investigation to evaluate
whether a practice constitutes information blocking.
OIG has 6 years from the date an actor committed a practice that
constitutes information blocking to impose a CMP. Section 3022(b)(2)(C)
of the PHSA requires that the CMP for information blocking follow the
procedures under section 1128A of the SSA, and section 1128A(c)(1)
requires that an action for CMPs must be initiated within 6 years from
the date the violation occurred.
Even though pursuant to section 1128A of the SSA OIG may commence
an action to impose CMPs up to 6 years after the date of a violation,
an actor may want to maintain information for additional time beyond 6
years. Actors in a CMP enforcement action bear the burden of proof for
affirmative defenses and mitigating circumstances by a preponderance of
the evidence. 42 CFR 1005.15(b)(1).
How an actor meets that burden may depend, in part, on records or
documentation they maintain. For example, a party may choose to
maintain documents demonstrating they meet a specific exception in the
information blocking regulations in 45 CFR part 171.
Furthermore, the ONC Final Rule did not establish record retention
requirements for actors to maintain documents relating to an exception
for a specified period of time. Although ONC did not set record
retention duration requirements, ONC explained that many exceptions
with documentation conditions are related to other existing regulatory
requirements that have document retention standards. For example, the
Security Exception at 45 CFR 171.203 is closely aligned to the HIPAA
Security Rule, which has a six-year documentation retention requirement
in 45 CFR 164.316. 85 FR 25819, May 1, 2020.
We also note that the ONC Final Rule established records and
information retention requirements for health IT developers of
certified health IT as part of the ONC Health IT Certification Program.
The Maintenance of Certification requirement at 45 CFR 170.402(b)
generally requires a health IT developer participating in the ONC
Health IT Certification Program to retain all records and information
necessary to demonstrate initial and ongoing compliance with the
requirements of the ONC Health IT Certification Program for a period of
10 years beginning from the date of certification.
2. Effective Date
We proposed two alternative effective dates for the CMP for
information blocking. The first proposal proposed an effective date of
60 days from the date of the publication of the final rule. OIG
recognized that information blocking is newly regulated conduct and
that individuals and entities would require time to take steps to
achieve compliance with the ONC Final Rule. The second
[[Page 42827]]
proposal proposed that we would set a specific date when OIG's CMP
regulations would become effective. OIG specifically proposed an
effective date of October 1, 2020, but also noted that we were
considering effective dates sooner or later than October 1, 2020. Most
of the comments submitted in response to the proposed rule expressed a
preference for one of the two proposed approaches. Commenters preferred
having a date certain, but no specific effective date was the clear
preferred approach by a majority of those who preferred a date certain.
Commenters also made several recommendations for alternative
approaches.
We are finalizing an effective date for the CMP for information
blocking of September 1, 2023.
Comment: Most commenters suggested that OIG adopt a date certain
and specifically align the effective date of its CMP for information
blocking with the effective dates for the ONC Final Rule and the CMS
Interoperability and Patient Access Final Rule (CMS Final Rule) (85 FR
25510, May 1, 2020). Some commenters stated that having a single
effective date/enforcement date for all three rules would be beneficial
for preparing for compliance with these rules. Some proposed specific,
alternative effective dates to allow individuals and entities time to
come into compliance. Others did not propose specific effective dates,
but proposed an extended period of time between the publication of the
final rule and the start of enforcement to permit additional time for
ONC to issue additional guidance, for ONC to provide education and
outreach, and for OIG to take into consideration the PHE. Some believed
that enforcement should begin 3 months after publication of OIG's final
rule while several commenters believed the appropriate amount of time
was 6 months after publication of this rule. A few commenters suggested
that the appropriate amount of time was 1 year or 2 years after
publication of this rule. Some commenters supported the proposal for an
effective date of the CMP for information blocking to be 60 days after
publication of the final rule. The commenters who supported this
proposal believed that 60 days after publication provided sufficient
time for actors to review and respond to any items that OIG was to
outline in its final rule and provide sufficient flexibility and
assistance to actors seeking to comply.
Response: Having considered the comments, we are finalizing our
proposal for an effective date for the CMP for information blocking at
42 CFR 1003.1400, 1003.1410, and 1003.420 as September 1, 2023. We
believe this effective date responds to requests for such a delay. It
also addresses commenters' concerns about having time to obtain
additional guidance and come into compliance, particularly given the
amount of time between the publication of the proposed rule and this
final rule. In addition, the selection of this effective date aligns
with the goals stated in the proposed rule of providing individuals and
entities sufficient time to finalize their ongoing efforts to comply
with the ONC information blocking regulations and putting the industry
on notice of when penalties will apply to information blocking conduct.
This effective date is consistent with the requests of commenters who
supported a date certain because those commenters largely sought a
specific date to have additional time for compliance efforts. This
effective date achieves that goal based on the time between the
proposed rule and this rule, which is longer than most specific dates
proposed by commenters.
As commenters shared with us in responses to the proposed rule, the
PHE has significantly affected the United States, patients, health care
providers, and the many individuals and entities that support health
care operations. Actors that could be subject to the CMP for
information blocking have been responding to COVID-19 on many fronts
including addressing information technology-related requirements
related to COVID-19, such as reporting data to multiple government
agencies. All of this has increased demands on health IT developers of
certified health IT, HIEs, and HINs. Recognizing these unprecedented
circumstances, the effective date for the CMP for information blocking
is reasonable and aligns with the goals stated in the proposed rule.
Furthermore, OIG will not impose a CMP on information blocking conduct
occurring before the effective date of this final rule.
We reiterate that the effective date of the CMP for information
blocking only applies to those actors defined at 45 CFR 171.102 as
health IT developers of certified health IT, HINs, and HIEs. We note
that the CMP for information blocking does not apply to health care
providers except to the extent such health care providers meet the
definition of a health IT developer of certified health IT or an HIN/
HIE. We discuss in section IV.A.3 of the preamble of this final rule
how we evaluate whether health care providers may meet the health IT
developer of certified health IT or an HIN/HIE.
3. Basis for Civil Money Penalties for Information Blocking
OIG proposed a basis for the CMP for information blocking at 42 CFR
1003.1400. In setting forth the basis for the CMP in the proposed rule,
we proposed that we may impose a CMP against any individual or entity
as defined in 45 CFR 171.103(b) that commits information blocking, as
defined in 45 CFR part 171. We also proposed that OIG's enforcement
would rely on the regulatory definitions set forth by ONC in the ONC
Final Rule. Commenters agreed with OIG's proposed approach but
requested clarification as to how OIG would interpret the definitions
set forth in 45 CFR 171.103(a)(2).
We note that since the publication of the proposed rule, ONC has
published the ONC interim final rule (IFR) (85 FR 70064, November 4,
2020) that clarified that 45 CFR 171.103(a)(2) refers to health IT
developers of certified health IT rather than health information
technology developers.
In this final rule, we finalize 42 CFR 1003.1400 as proposed with a
technical correction that incorporates 45 CFR 171.103(a)(2) instead of
45 CFR 171.103(b) and a slight language change to reflect our intent.
Comment: One commenter noted that the regulatory text of our
proposed Sec. 1003.1400 should have cited 45 CFR 171.103(a)(2) instead
of Sec. 171.103(b) when referring to those individuals or entities
subject to civil money penalties.
Response: We agree with the commenter that the correct citation is
45 CFR 171.103(a)(2) and are making this technical correction at 42 CFR
1003.1400. Our intent, as expressed in the proposed rule, was to
incorporate ONC's definition of ``information blocking,'' which matches
the statutory language in section 3022(a)(1) of the PHSA. This final
rule corrects the technical citation error in the proposed rule and is
not a substantive change.
We further note that we have changed the language ``as defined in''
to ``as set forth in'' consistent with our intent to incorporate ONC's
information blocking regulations in 45 CFR part 171. The regulation at
45 CFR part 171 includes general provisions, including definitions,
relevant to the information blocking regulations, as well as the
``exceptions'' to the definition of information blocking. We believe
this language change from ``as defined in'' to ``as set forth in''
better reflects our intent to incorporate all of ONC's information
blocking regulations into the OIG CMP regulations.
[[Page 42828]]
Comment: Commenters requested clarification as to whether they meet
the definition of HIN/HIE. Some commenters requested clarification on
whether they would meet the definition of HIN/HIE under specific facts,
such as by using ONC-certified application programming interface (API)
technology as a health care provider, or by engaging in specific
processes as a health plan. Some commenters requested clarification as
to whether certain types of entities met the definition of HIN/HIE,
specifically asking whether a public health institution combating
COVID-19, clinical data registries, public health agencies, or a health
plan would ever be considered an HIN/HIE. Other commenters requested
clarification and examples of when a health care provider would meet
the definition of HIN/HIE and be subject to CMPs rather than
disincentives. Some commenters suggested that a health care provider or
payer should never be considered an HIN/HIE for purposes of the final
rule.
Response: OIG will use the definitions in ONC regulations at 45 CFR
171.102 and any guidance issued by ONC when evaluating whether an
individual or entity meets the definition of HIN/HIE. Such
determinations are individualized and highly dependent on the facts and
circumstances presented. Because the ONC definition of HIE/HIN is a
functional definition that does not specifically include or exclude any
particular individuals or entities, OIG cannot establish in this final
rule whether specific individuals or entities or categories of
individuals or entities would meet the definition of HIN/HIE as some
commenters requested. OIG investigations of information blocking will
include gathering facts necessary to assess whether a specific
individual or entity meets a definition of health IT developer of
certified health IT or HIE/HIN. Furthermore, we proposed following the
definitions promulgated in the ONC Final Rule, which are now found at
45 CFR 171.102, and which do not exempt specific types of individuals
or entities from the definition of an HIN/HIE that could commit
information blocking. Accordingly, we decline to exempt specific types
of individuals or entities, including providers or payers, in this
final rule.
The ONC regulations define an HIN/HIE as an individual or entity
that determines, controls, or has the discretion to administer any
requirement, policy, or agreement that permits, enables, or requires
the use of any technology or services for access, exchange, or use of
EHI: (1) among more than two unaffiliated individuals or entities
(other than the individual or entity to which this definition might
apply) that are enabled to exchange with each other; and (2) that is
for a treatment, payment, or health care operations purpose, as such
terms are defined in 45 CFR 164.501 regardless of whether such
individuals or entities are subject to the requirements of 45 CFR parts
160 and 164. 45 CFR 171.102. When determining whether an individual or
entity meets the definition of an HIN/HIE, we may consult with ONC.
In making a fact-specific assessment of whether an individual or
entity meets the definition of an HIN/HIE in 45 CFR 171.102, we would
assess whether the individual or entity determines, controls, or has
the discretion to administer any requirement, policy, or agreement that
permits, enables, or requires the use of any technology or services for
access, exchange, or use of EHI among two or more unaffiliated entities
(other than the individual or entity that is the subject of the
allegation) that are enabled to exchange with each other for a
treatment, payment, or health care operations purpose as such terms are
defined in 45 CFR 164.501. As stated in the ONC Final Rule, the
definition of HIN/HIE in 45 CFR 171.102 does not cover bilateral
exchanges in which an intermediary is simply performing a service on
behalf of one entity in providing EHI to another entity or multiple
entities and no actual exchange is taking place among all entities. 85
FR 25802, May 1, 2020. The ONC Final Rule also states that for the two
unaffiliated individuals or entities besides the HIE/HIN to be enabled,
the parties must have the ability and the discretion to exchange with
each other under the policies, agreements, technology, and/or services.
85 FR 25802, May 1, 2020. Based on the ONC Final Rule and depending on
the specific facts and circumstances, public health institutions,
clinical data registries, public health agencies, health plans, and
health care providers could meet the definition of an HIN/HIE. As part
of our assessment of whether a health care provider or other entity is
an HIN/HIE that could be subject to CMPs for information blocking, OIG
anticipates engaging with the health care provider or other entity to
better understand its functions and to offer the provider an
opportunity to explain why it is not an HIN/HIE. We note further that
should the definitions in 45 CFR part 171 change in the future, we
would continue to look to applicable definitions in 45 CFR part 171
when determining whether an individual or entity was an HIN/HIE at the
time of the conduct.
Comment: One commenter noted that the definition of HIN/HIE could
apply to individuals serving on HIN governance and advisory committees
and requested clarification about whether OIG would direct enforcement
against an individual serving on an advisory board for an entity that
qualifies as an HIN. The commenter noted that HIEs and HINs rely upon
their governance and advisory committees and that individuals subject
to enforcement may not want to provide their perspectives or
participate on these committees.
Response: While we believe it is unlikely that an individual
serving on an HIN/HIE governance and advisory committee would be
subject to information blocking enforcement, such individuals could be
subject to enforcement if, based on the specific facts, they meet the
definition of HIN/HIE and have engaged in information blocking with the
requisite intent. To provide transparency on how OIG would assess an
allegation involving an individual described by the commenter, we
provide the following explanation.
Consistent with section 3022(b)(2)(A) of the PHSA, individuals or
entities subject to the CMP for information blocking must fall within a
definition in 45 CFR 171.102 that describes one of the categories of
actors that are subject to the CMP under section 3022(b)(2)(A) (i.e.,
developers, networks and exchanges). First, we emphasize that to
determine whether an individual on an advisory board met the definition
of an HIN/HIE, we would assess the specific facts and circumstances in
the case. In assessing whether an individual met the definition of HIN/
HIE, OIG would consider the advisory board's purpose and authority to
determine, control, or have discretion to administer any requirement
policy, or agreement. OIG would also consider the individual's role,
the individual's authority, and whether the individual determines,
controls, or has the discretion to administer any requirement, policy,
or agreement as a member of the advisory board. An individual or entity
that does not determine, administer, or have discretion to administer a
policy, requirement, or agreement would not meet the definition of an
HIN/HIE. For example, the mere act of serving on an advisory board
would not mean an individual is an HIN/HIE.
Second, to impose CMPs against an individual, OIG would have to
demonstrate that the individual committed an act of information
blocking, which includes a requisite intent. Assuming the individual on
the
[[Page 42829]]
advisory board met the definition of an HIN/HIE, OIG would examine
whether the individual engaged in a practice that constituted
information blocking. We would analyze the specific practice engaged in
by the individual to determine CMP liability. This is consistent with
section 3022(a)(6) of the PHSA, which states that information blocking
with respect to an individual or entity shall not include an act or
practice other than an act or practice committed by such individual or
entity. Also consistent with the statute and the implementing
regulations in 45 CFR 171.103(a)(2), we would determine whether the
individual knew or should have known that the practice in which the
individual engaged was likely to interfere with the access, exchange,
or use of EHI.
OIG maintains discretion in evaluating what claims to investigate
and when to impose CMPs. OIG is not required to--and does not expect to
be able to--investigate every allegation it receives. Similarly, OIG
may decide it is appropriate to impose CMPs on an entity but not on
both an entity and an individual for the same conduct.
Comment: One commenter requested guidance on whether a health care
provider would ever be viewed as a health IT developer of certified
health IT. The commenter specifically asked whether a health care
provider that sublicensed certified health IT to an unaffiliated
provider could be subject to CMPs.
Response: A health care provider may meet the definition of a
health IT developer of certified health IT in Sec. 171.102, depending
on the specific facts and circumstances. This regulatory definition
excludes from its scope a health care provider that self-develops
health IT for its own use. If any other individual or entity, including
a health care provider, develops or offers one or more health IT
modules certified under the ONC Health IT Certification Program, then
they may meet the definition of health IT developer of certified health
IT. If an individual or entity meets the definition of health IT
developer of certified health IT and engages in conduct constituting
information blocking, then that individual or entity could be subject
to CMPs.
Regarding the commenter's specific question, section 3022(b)(1)(A)
of the PHSA authorizes OIG to investigate claims of information
blocking against any ``other entity offering certified health
information technology,'' and the definition of a health IT developer
of certified health IT at 45 CFR 171.102 includes an individual or
entity that ``offers health information technology.'' ONC further
clarified in the ONC Final Rule its policy goal to hold all entities
that could, as a developer or offeror, engage in information blocking
accountable for their practices that are within the definition of
information blocking in 45 CFR 171.103. ONC expressly considered
comments to exclude from the definition those entities that only offer
technology, rather than modify, configure, or develop it, and declined
to do so. 85 FR 25798-99, May 1, 2020. OIG would assess whether a
provider that sublicenses technology to an unaffiliated entity meets
the definition of a health IT developer of certified health IT at 45
CFR 171.102 based on the specific facts and circumstances.
ONC specifically exempted health care providers that self-develop
health IT for their own use from the definition of ``health IT
developer of certified health IT.'' The ONC Final Rule clarifies that
health care providers that self-develop health IT for their own use
refers to health care providers that are the primary users of the
health IT and are responsible for its certification status. 85 FR
25799, May 1, 2020. The ONC Final Rule states that ONC interprets ``a
health care provider that self-develops health IT for its own use'' to
mean that a health care provider does not offer the self-developed
health IT to other entities on a commercial basis or otherwise. 85 FR
25799, May 1, 2020. The ONC Final Rule clarifies that a self-developer
is not an offeror if it issues login credentials to a licensed health
care professional in an independent practice that allow the use of a
hospital's electronic health records (EHRs) to furnish and document
care to patients in the hospital. 85 FR 25799, May 1, 2020. Whether an
individual or entity ``offers health information technology'' requires
a fact-specific inquiry, and we expect to consult with ONC in
determining whether an individual or entity meets this definition.
As part of any investigation, OIG will need to evaluate whether an
individual or entity meets the definition of health IT developer of
certified health IT or health information exchange or network. If OIG
determines this definition is met and conduct meets the definition of
information blocking, OIG may impose CMPs.
Comment: One commenter asked whether a parent company could be
subject to CMPs for information blocking based on the conduct of a
subsidiary.
Response: Whether information blocking on the part of a subsidiary
is attributable to the parent entity depends on the specific facts and
circumstances.
Specifically, if a subsidiary acts as the agent of the parent, the
parent may be subject to CMPs for the act of the subsidiary if the
subsidiary commits information blocking within the scope of agency.
Section 3022(b)(2)(C) of the PHSA states that the provisions of section
1128A of the SSA shall apply to a CMP for information blocking. Section
1128A(l) of the SSA states that a principal is liable for penalties,
assessments, and exclusion for the acts of the principal's agent acting
within the scope of agency.
There may be other instances when information blocking by a
subsidiary may create CMP liability for the parent. We note that
nothing in the statute or ONC Final Rule precludes such liability, and
the ONC Final Rule provides that a health IT developer of certified
health IT includes not only the entity that is legally responsible for
the certification status of the health IT but could also include any
subsidiaries or successors, depending on the specific facts and
circumstances of a particular case. 85 FR 25800, May 1, 2020. At this
time, we do not have sufficient experience or evidence to delineate
specific circumstances where a parent might be liable for information
blocking by its subsidiary. We would make any determinations based on
the specific facts and circumstances presented.
Comment: One commenter believed that EHR vendors may limit the
access of third-party vendors to data, data stores, databases, and
endpoints that store data that are not part of the United States Core
Data for Interoperability (USCDI).\1\ Specifically, the commenter was
concerned that an EHR vendor may grant a health care provider access to
a database and then deny a third-party vendor the same access. The
commenter suggested OIG monitor and penalize EHR vendors that restrict
access to data not represented in the USCDI.
---------------------------------------------------------------------------
\1\ USCDI is a standardized set of health data classes and
constituent data elements for nationwide, interoperable health
information exchange.
---------------------------------------------------------------------------
Response: Whether a practice constitutes information blocking
depends on the specific facts and circumstances. First, the practice
must involve EHI as defined in ONC's information blocking regulations.
On and after October 6, 2022, EHI for purposes of the information
blocking definition in 45 CFR 171.103(a) is not limited to the
information identified by data elements represented in the USCDI
standard adopted in 45 CFR 170.213, and practices that interfere with
access,
[[Page 42830]]
exchange, or use of any information falling within the definition of
EHI in 45 CFR 171.102 may constitute information blocking.
However, even after October 6, 2022, the definition of EHI still
excludes certain types of data that an actor may have. For example, EHI
does not include psychotherapy notes as defined in 45 CFR 164.501.
Therefore, the specific facts and circumstances will determine whether
the data that is the subject of a claim of information blocking
constitutes EHI.
Second, the practice must constitute information blocking and the
individual or entity must have had the requisite intent. We will assess
whether the practice is likely to interfere with the access, exchange,
or use of EHI, and whether the practice was required by law or met one
of the information blocking exceptions. For example, in assessing an
allegation similar to the commenter's fact pattern, we may assess
whether the health IT developer of certified health IT provided the EHI
to the health care provider and the third-party vendor using an
alternative manner specified by the third-party vendor consistent with
the Content & Manner Exception in 45 CFR 171.301.
Comment: One commenter encouraged OIG to impose CMPs for
information blocking on health IT developers of certified health IT
with transfer of liability provisions in their contracts. The commenter
noted that small and mid-size organizational health care providers are
often presented with service contracts that have undesirable terms on a
``take it or leave it'' basis because they may have only one health IT
developer available or lack the market share (i.e., leverage) necessary
to negotiate out of the undesirable terms.
Response: OIG's information blocking regulations establish the
basis for imposing CMPs for information blocking, which is whether the
conduct constitutes information blocking as defined in 45 CFR 171.103.
The ONC Final Rule established that a variety of contractual provisions
could interfere with the access, exchange, and use of EHI and thus
implicate the information blocking provision. For example, ONC
explained that a contract may implicate the information blocking
provision if it includes unconscionable terms for the access, exchange,
or use of EHI, or licensing of an interoperability element that could
include, but is not limited to, agreeing to indemnify the actor for
acts beyond standard practice, such as gross negligence on the part of
the actor. ONC explained further that such terms may be problematic
with regard to information blocking in situations involving unequal
bargaining power relating to accessing, exchanging, and using EHI. 85
FR 25812, May 1, 2020. We will consult with ONC as necessary to inform
our determinations as to whether specific service contracts,
provisions, and related practices that transfer liability implicate the
information blocking provision.
Comment: One commenter stated that the CMS Final Rule requires
State Medicaid agencies to make claims with a service date on or after
January 1, 2016, available to a beneficiary or a beneficiary's personal
representative. But the rule did not specify how long these claims had
to be made available. The commenter asked whether the purging of those
claims would subject State Medicaid agencies to information blocking
penalties.
Response: OIG does not intend to use its authority to investigate
information blocking under section 3022(b)(1) of the PHSA to
investigate compliance under CMS program requirements. If an
investigation uncovers conduct that suggests non-compliance with CMS
program requirements, OIG may refer such matters to CMS.
4. Definition of Violation
OIG proposed that a violation be defined as a practice, as defined
at 45 CFR 171.102, that constitutes information blocking, as defined at
45 CFR part 171. We have finalized the definition of violation as
proposed with a slight modification at 42 CFR 1003.1410(a).
Comment: Many commenters expressed support for our proposed
definition of ``violation'' and the incorporation of ONC's definition
of ``practice.'' Commenters requested that we provide additional
clarity and guidance as to the distinction between a single violation
and multiple violations. Other commenters stated that we should provide
more specific criteria for identifying a single violation as opposed to
multiple violations. Some commenters requested additional clarity as to
whether a practice involving multiple patient records would constitute
multiple violations.
Response: As finalized in this rule, a violation is a practice, as
defined in 45 CFR 171.102, that constitutes information blocking, as
set forth in 45 CFR part 171. We note that we have changed the language
from ``as defined in'' to ``as set forth in,'' consistent with our
intent to incorporate all of ONC's regulations. Whether a practice
constitutes a violation depends on the specific facts and
circumstances. We did not propose, and therefore this rule does not
finalize, specific criteria that we would use to identify single or
multiple violations because we do not have enough information or
experience with information blocking enforcement to allow us to
establish a set of criteria that could apply uniformly to all
information blocking allegations. As we gain more experience in
assessing allegations, conducting information blocking investigations,
and imposing CMPs, we may identify patterns or data that allow us to
develop guidance with more specific criteria.
In response to commenters' requests, we are providing below
hypothetical examples illustrating how we would determine whether
information blocking practices constitute single or multiple
violations. The examples set out in the proposed rule at 85 FR 22986-87
remain applicable. But, we clarify that the examples provided in the
proposed rule should be understood as involving health IT developers of
certified health IT, since health IT developers that do not meet the
regulatory definition of health IT developers of certified health IT
would not be subject to CMPs. We emphasize that the examples in this
preamble and in the preamble to the proposed rule are illustrative,
fact-dependent, and not exhaustive. We further note that while our
examples discuss the use of health information technology certified
under the ONC Certification Program, an individual or entity that meets
the definition of a health IT developer of certified health IT or HIE/
HIN may engage in conduct that constitutes information blocking
relating to health IT certified under the ONC Certification Program,
health IT not certified under the ONC Certification Program, or a
combination of both.
The following hypothetical examples of conduct assume that the
facts meet all the elements of the information blocking definition--
including the requisite level of statutory intent.
A health IT developer (D1) connects to an API supplied by
health IT developer of certified health IT (D2). D2's API has been
certified to 45 CFR 170.315(g)(10) (standardized API for patient and
population services) of the ONC Certification Program and is subject to
the ONC Condition of Certification requirements at 45 CFR 170.404
(certified API technology). A health care provider using D1's health IT
makes a single request to receive EHI for a single patient via D2's
certified API technology. D2 denies this request. OIG would consider
this a single violation by D2 affecting a single patient. The violation
would consist of D2's denial of
[[Page 42831]]
the request to exchange EHI to the provider through D2's certified API.
A health care provider using technology from a health IT
developer (D1) makes a single request to receive EHI for 10 patients
through the certified API technology of a health IT developer of health
IT (D2). D2 takes a single action to prevent the provider from
receiving any patients' information via the API. OIG would consider
this as a single violation affecting multiple patients. This is a
single violation as D2 took a single action to deny all requests from
the provider. The number of patients affected by the violation would be
considered when determining the amount of the CMP.
A health care provider using health IT supplied by a
health IT developer (D1) makes multiple, separate requests to receive
EHI for several patients via certified API technology supplied by a
health IT developer of certified health IT (D2). Each request is for
EHI for one or more patients. D2 denies each individual request but
does not set up the system to deny all requests made by the health care
provider through D2's certified API technology. Thus, D2 is taking
separate actions to block individual requests. OIG would consider this
conduct to consist of multiple violations affecting multiple patient
records. Each denial would be considered a separate violation. The
number of patients affected by each violation would be considered in
determining the amount of the penalty per violation. We note that for
purposes of this example, each denial by D2 constitutes a separate act
and thus a separate violation. Thus, if the health care provider using
D1's health IT made one request for one patient's EHI, a second request
for three patients' EHI, and a third request for five patients' EHI,
there would be three separate violations but the penalties may vary due
to the number of patients affected by each violation. The action or
actions taken by D2 in response to the health care provider's requests
provide the basis for assessing whether a practice constitutes a single
or multiple violations.
A health care provider using health IT supplied by a
health IT developer (D1) makes multiple requests to receive EHI for a
single patient via certified API technology supplied by a health IT
developer of certified health IT (D2). But D2 has updated its system to
deny all requests made by anyone using D1's technology. Thus, none of
the requests by the provider using D1's health IT result in the
provider receiving any EHI and D2 always denies requests based on the
system change. OIG would consider this practice a single violation. The
violation in this case is the singular action to update the system to
always deny EHI to anyone requesting to receive the EHI via D1 or D1's
health IT. The result of this violation is that all of the requests are
denied; however, each individual denial does not constitute a
violation. The number of patients affected by D2's denial may
constitute an aggravating circumstance resulting in an increased
penalty.
A health IT developer of certified health IT enters into a
software license agreement with a health care provider that requires
that the health care provider pay a fee for the express purpose of
permitting the health care provider to export patients' EHI via the
capability certified according to 45 CFR 170.315(b)(10) for switching
health IT systems. When the health care provider requests the
electronic export, the health IT developer of certified health IT
charges the health care provider the fee. We note that the Fees
Exception in 45 CFR 171.302 excludes fees charged for an export using
functionality certified according to 45 CFR 170.315(b)(10) for purposes
of switching health IT. OIG would consider this conduct to include two
violations. The first violation would be inclusion of the contract
provision (fee) that is likely to interfere with, prevent, or
materially discourage access, exchange, or use of EHI. The second
violation would be charging the health care provider the fee. Charging
the fee in this case constitutes a separate action, and therefore a
separate violation from the inclusion of the fee in the software
license agreement.
We emphasize that information blocking only requires engaging in a
practice that is likely to interfere with, prohibit, or materially
discourage the access, exchange, or use of EHI. Information blocking
does not require that the practice actually interferes with, prohibits,
or materially discourages the access, exchange, or use of EHI.
Comment: One commenter expressed concern that the example in the
proposed rule concerning the health IT developer vetting a third-party
application might cause health IT developers to forgo necessary
security and privacy vetting of applications due to fear of potentially
committing an information blocking violation.
Response: In the preamble to the proposed rule, we provided an
example where a health IT developer requires vetting of third-party
applications before the applications can access the health IT
developer's product, but the health IT developer denies applications
based on the functionality of the application and not for a privacy or
security concern. 85 FR 22987. We note that the ONC Final Rule
contained a discussion of vetting, and we agree with the commenter that
our example in the preamble to the proposed rule at 85 FR 22987 could
benefit from additional explanation.
Before clarifying our example, we provide some of the discussion of
``vetting'' from the ONC Final Rule. First, we note that ``vetting'' in
this context is intended to mean a determination regarding whether the
application posed a security risk to the health IT developer of
certified health IT's software. Second, pursuant to the ONC Final Rule,
a vetting process applied in a discriminatory or unreasonable manner
could implicate the information blocking provision. 85 FR 25814-17, May
1, 2020. Third, the ONC Final Rule states that for certified API
technology (e.g., a Health IT Module certified to Sec. 170.315(g)(10),
which includes the use of OAuth2 among other security requirements
(see, e.g., 85 FR 25741) in addition to its focus on ``read-only''/
responses to requests for EHI to be transmitted, there should be few,
if any, security concerns about the risks posed by patient-facing apps
to the disclosing actor's health IT systems (because the apps would
only be permitted to receive EHI at the patient's decision). Thus, for
third-party applications chosen by individuals to facilitate their
access to their EHI held by actors, there would generally not be a need
for ``vetting'' on security grounds and such vetting actions would be
an interference. 85 FR 25815, May 1, 2020. Fourth, actors, such as
health care providers, have the ability to conduct whatever ``vetting''
they deem necessary of entities (e.g., app developers) that would be
their business associates under HIPAA before granting access and use of
EHI to the entities. In this regard, covered entities must conduct
necessary vetting in order to comply with the HIPAA Security Rule. 85
FR 25815, May 1, 2020.
With this in mind, we clarify the example as follows. A health IT
developer of certified health IT requires vetting of third-party
applications to determine whether the applications pose a security risk
before the applications are permitted to interface or integrate with
the health IT developer of certified health IT's product, which
contains EHI. The health IT developer of certified health IT does not
apply this vetting process to third party applications selected and
authorized by a patient or provider to receive EHI from ``certified API
technology,'' as defined as 45 CFR 170.404(c). The health IT developer
of certified health IT does not
[[Page 42832]]
apply this vetting to patients or API Information Sources, as defined
at 45 CFR 170.404(c), which are only receiving EHI through a
standardized API. And, the health IT developer of certified health IT
does not engage the third-party applications as a business associate or
business associate subcontractor. The health IT developer of certified
health IT uses vetting to deny EHI access to third-party applications
that compete with one of the developer's applications. The health IT
developer of certified health IT then denies third-party applications
solely on the basis that they compete with one of the developer's
applications. Each denial based on the competitive nature of the third-
party application is considered a separate violation, as it is a
separate act or omission.
If an actor, such as a health IT developer of certified health IT,
identifies specific security risks posed by a third-party application,
the actor may address those risks consistent with the Security
Exception at 45 CFR 171.203 to ensure its practices are not considered
information blocking.
Comment: One commenter requested that OIG consider compliance with
privacy and security standards as an important factor when evaluating
what constitutes a violation.
Response: Both section 3022(a)(1)(A) of PHSA and 45 CFR
171.103(a)(1) exempt from the definition of information blocking
practices required by law. Therefore, if a practice is required by
privacy or security laws, it does not constitute information blocking.
85 FR 25846, May 1, 2020. However, privacy and security standards that
are not required by law (such as trade best practices or voluntary
industry standards) would not be exempt from the definition of
information blocking, unless an exception applies. When investigating
an allegation, we may coordinate with other agencies to understand
whether the practice was required under applicable privacy and security
laws.
Additionally, ONC established separate Privacy and Security
Exceptions at 45 CFR 171.202 and 171.203. If a practice meets all
conditions of an exception at all relevant times, then the practice
would not be considered information blocking. When investigating an
allegation, OIG will assess whether a practice meets an exception.
Comment: Several commenters requested that OIG clarify its view on
when the enactment of a policy constitutes information blocking.
Commenters requested clarity on whether OIG would view the enactment of
a policy that constitutes information blocking as a single violation or
multiple violations. Some commenters suggested that consistent and
repetitive implementation of a policy should be considered a single
violation, regardless of the number of times the policy was applied.
Another commenter suggested that we should approach violations and
penalties as OCR did in its HIPAA Administrative Simplification
Enforcement Final Rule, 71 FR 8390, February 16, 2006, specifically
that we should consider a pattern or practice of information blocking
to be more violations than a single instance emanating from the same
conduct or type of conduct.
Response: We will treat the enactment of a policy that is likely to
interfere with, prevent, or materially discourage as one violation. But
each enforcement of the policy will constitute another, separate
violation. If the creation or existence of the policy alone is what
determined the number of violations, and not the number of times the
policy was enforced, large organizations with many customers or
significant market share would be able to enact policies--regardless of
whether they have been written or formalized--and engage in nationwide
conduct constituting information blocking against multiple individuals
or entities knowing that the maximum penalty would be the statutory
maximum of $1 million. A practice is defined as an act or omission by
an actor. 45 CFR 171.102. Given that our definition of violation
incorporates the word ``practice'' and expressly refers to ONC's
definition of practice, the number of violations is connected to the
number of discrete acts engaged in by the actor and will depend on the
specific facts and circumstances.
5. Determinations Regarding the Penalty Amounts
We proposed to add new 42 CFR 1003.1420 that would codify the
statutory factors that OIG must consider when imposing CMPs for
committing information blocking. Section 3022(b)(2)(A) of the PHSA
mandates that in determining the amount of a CMP for information
blocking, OIG must consider factors such as the nature and extent of
the information blocking and the harm resulting from such information
blocking including, where applicable, the number of patients affected,
the number of providers affected, and the number of days the
information blocking persisted. The proposed regulatory text included
these statutory factors. Given the novel nature of information blocking
investigations and enforcement, we recognized in the preamble to the
proposed rule that we have limited experience to inform the proposal of
additional aggravating and mitigating circumstances to adjust the CMP
penalties. Thus, we proposed only to implement the statutory factors
described above. We also solicited comment on any additional factors
that we should consider for the final rule. We received several
comments on proposed factors and a number of recommendations to
implement other factors.
We are finalizing 42 CFR 1003.1420 as proposed with a modification
to the regulatory text at 42 CFR 1003.1420(a), which is the factor for
``nature and extent of the information blocking.'' For this factor, we
have added to the regulatory text the specific facts that section
3022(b)(2)(A) of the PHSA directs us to take into account where
applicable: the number of patients affected (42 CFR 1003.1420(a)(1)),
number of providers affected (42 CFR 1003.1420(a)(2)), and the number
of days the information blocking persisted (42 CFR 1003.1420(a)(3)). In
the preamble of the proposed rule, we explained our intent was to
specifically implement the exact statutory factors in section
3022(b)(2)(A). 85 FR 22987, April 24, 2020.
Comment: Some commenters requested that OIG consider additional
aggravating and mitigating factors when determining the penalty amount
it will impose. Commenters suggested considering characteristics of the
actor, including an actor's size, market share, whether the actor faced
systemic barriers to interoperability, whether the actor took
corrective action prior to imposition of a penalty, and the actor's
compliance, specifically the actor's history of compliance with the
information blocking rules, the robustness of an actor's compliance
program, and whether the actor made good faith efforts to seek ONC/OIG
guidance. Some commenters suggested considering the consequences of the
conduct, such as whether the information blocking resulted in patient
harm and the severity of that harm, and whether the information
blocking impacted another actor's ability to access information (i.e.,
interfered with a provider's ability to deliver patient care). Some
commenters suggested looking at the specific conduct at issue,
specifically whether the information blocking involved a single
violation or multiple violations, whether an actor had specific intent
to engage in information blocking, whether the actor had control and
the extent of that control over the EHI, and whether there were
contributory practices by others.
[[Page 42833]]
Some commenters suggested that OIG consider mitigating factors beyond
an actor's control, such as the effects of natural disasters and public
health emergencies (such as the PHE caused by the COVID-19 pandemic) on
health care delivery and data exchange. Furthermore, commenters also
suggested that practices that exacerbate the negative impact of natural
disasters and public health emergencies be considered an aggravating
factor. Some commenters suggested that OIG should consider adopting
factors based on factors used by OCR in assessing HIPAA CMPs. Some
commenters recommended that OIG consider instances of an actor self-
disclosing information blocking conduct as a mitigating factor.
Response: We thank commenters for the recommendations of additional
aggravating and mitigating factors that OIG should consider. We may
consider implementing additional, specific factors in the future via
notice and comment rulemaking as we gain more experience in enforcing
the CMP for information blocking. At this time, however, we are
finalizing the statutory factors listed in section 3022(b)(2)(A) of the
PHSA as we proposed, with the modification to the proposed factor for
``nature and extent of the information blocking'' described above.
While we are not adopting additional aggravating and mitigating
factors specific to information blocking, we observe that the existing,
general factors we must consider under the CMPL will apply to the CMP
for information blocking and may address many of the commenters'
concerns. The PHSA requires that the provisions of section 1128A of the
SSA (other than subsection (a) and (b) of such section) apply to a CMP
for information blocking in the same manner as such provisions apply to
a CMP or proceeding under section 1128A(a) of the Act. Section 1128A(d)
of the SSA requires that OIG, when determining the amount or scope of
any assessment, penalty or exclusion imposed under subsection (a), take
into account ``(1) the nature of claims and the circumstances under
which they were presented, (2) the degree of culpability, history of
prior offenses, and financial condition of the person presenting the
claims, and (3) such other matters as justice may require.'' 42 U.S.C.
1320a-7a(d). These broad general factors apply to the CMP for
information blocking set forth in the PHSA as they do under section
1128A(a) of the SSA. They encompass some of the mitigating or
aggravating factors recommended by commenters.
The existing regulatory framework for OIG's CMPs requires that we
apply the aggravating and mitigating factors in 42 CFR 1003.140 to the
CMP for information blocking determinations in a manner consistent with
section 1128A.
As we set forth in the OIG Medicare and State Health Care Programs:
Fraud and Abuse Revisions to the Office of Inspector General's Civil
Monetary Penalty Rules Final Rule (Revisions Rule), we consider the
financial condition of an actor after we evaluate the facts and
circumstances of conduct and weigh aggravating and mitigating factors
to determine an appropriate penalty and assessment amount. 81 FR 88334,
December 7, 2016. Once OIG proposes a penalty amount, the individual or
entity may request that OIG consider its ability to pay the proposed
amount under procedures discussed in the Revisions Rule at 81 FR 88338.
In addition to the general factors in section 1128A, section
3022(b)(2)(A) of the PHSA specifies a non-exhaustive list of factors
that we must consider when imposing CMPs for information blocking. In
the proposed rule, we proposed incorporating the PHSA's specific
information blocking factors into our existing regulations at new Sec.
1003.1420 of title 42. This new section complements the existing
section at 42 CFR 1003.140.
We recognize that the statutory factors enumerated in the PHSA may
overlap with the general statutory and regulatory factors for all CMPs
in section 1128A of the SSA and in 42 CFR 1003.140. For example, we
recognize that ``the nature and circumstances of the violation,'' 42
CFR 1003.140(a)(1), is a similar factor to the ``nature and extent of
the information blocking'' and that, consequently, there may be a fact
pattern that implicates both factors. We would not apply both or
``double count'' these factors when determining the penalty. We would
make a holistic consideration of all aggravating factors when
determining the amount of any penalty; this approach would take into
account the similarity of the factors.
Many of the commenters' suggested factors, such as whether the
information blocking resulted in patient harm and the severity of that
harm, whether the actor had specific intent to engage in information
blocking, and whether there was one violation or multiple violations,
are already encapsulated by the general factors in 42 CFR 1003.140 or
the specific information blocking factors in 42 CFR 1003.1410 finalized
by this rule. We provide the following examples to illustrate how the
issues raised by commenters may be considered when we assess penalty
amounts using the two sets of factors at 42 CFR 1003.140 or 1003.1420.
For example, to assess the ``nature and circumstances'' in 42 CFR
1003.140 and ``nature and extent'' of the information blocking in 42
CFR 1003.1420, we will consider the factual nature, circumstances, and
extent of the information blocking conduct. Depending on the specific
facts and circumstances, these factors may include whether the practice
actually interfered with the access, exchange, or use of EHI; the
number of violations; whether an actor took corrective action; whether
an actor faced systemic barriers to interoperability; to what extent
the actor had control over the EHI; the actor's size; and the market
share.
Similarly, the general factor in 42 CFR 1003.140 relating to degree
of culpability would allow us to consider the commenters' suggested
factors relating to whether an actor had actual knowledge or whether an
actor had specific intent to engage in information blocking.
Additionally, to assess the ``harm'' factor in 42 CFR 1003.1420, we
will consider whether any harm--including physical or financial harm--
occurred and evaluate the severity and extent of the harm. In
accordance with the statutory language, we will consider the number of
patients affected, number of providers affected, and the duration of
the information blocking conduct. We recognize that the primary factors
set forth at Sec. 1003.140 may also contemplate harm. (For example, in
the Revisions Rule, we stated that our consideration of the ``nature
and circumstances'' would include ''whether patients were or could have
been harmed.'' 81 FR 88337, December 7, 2016.)
With respect to consideration of self-disclosure of information
blocking conduct, it is a mitigating circumstance under the general
factors at 42 CFR 1003.140(a)(2) for an actor to take appropriate and
timely corrective action in response to a violation. Relevant
corrective action must include disclosing the violation to OIG through
the SDP and fully cooperating with OIG's review and resolution of such
disclosure. As discussed in section III.C of the preamble, OIG does not
currently have an SDP for information blocking and plans on creating a
specific SDP for information blocking after publication of this rule.
We are also not adding factors related to the circumstances
surrounding the commission of the act, such as a factor that evaluates
whether there were contributory practices by others or an intervening
natural disaster. In some
[[Page 42834]]
instances, these factors are subsumed in existing general factors.
Moreover, section 3022(a)(6) of the PHSA states that ``information
blocking, with respect to an individual or entity, shall not include an
act or practice other than an act or practice committed by such
individual or entity.'' Information blocking, as to health IT
developers of certified health IT, HIEs, and HINs, is a practice that
an actor ``knows'' or ``should know'' is likely to interfere with,
prevent, or materially discourage the access, exchange, or use of EHI.
For example, in the circumstance of an intervening natural disaster
that prevents an actor from responding to requests for data, the actor
may not have the requisite level of intent. In such a situation, it is
unlikely that there would be a sufficient basis to pursue CMPs for
information blocking against the actor, and consideration of the
factors relating to determination of the amount of any penalty would
not be necessary.
Finally, we note that the modification to 42 CFR 1003.1420(a)
finalized in this final rule adds three specific facts OIG must
consider where applicable (number of patients affected, number of
providers, and number of days the information blocking persisted). This
modification aligns the factors at Sec. 1003.1420(a) more precisely
with the language of the PHSA. As we stated in the proposed rule,
section 3022(b)(2)(A) of the PHSA mandates the consideration of the
nature and extent of the information blocking and harm resulting from
such information blocking including, where applicable, the number of
patients affected, the number of providers affected, and the number of
days the information blocking persisted. We intended the language of
our proposed rule to reflect these statutory factors. 85 FR 22987,
April 24, 2020. These factors may also address several of the
commenters' concerns related to consideration of impact on patients and
providers.
Comment: Some commenters suggested an additional mitigating factor
of whether an actor was acting in accordance with another Federal law,
State law, or court order limiting or prescribing certain behaviors.
Response: Section 3022(a)(1)(A) of the PHSA and 45 CFR
171.103(a)(1) explicitly exclude conduct that is required by law from
the definition of information blocking. Therefore, if an actor's
conduct is required by law, it would not meet the definition of
information blocking, and OIG would not have the authority to impose
CMPs. In the ONC Final Rule, ONC explained that court orders and
binding administrative decisions are considered ``required by law.'' 85
FR 25794, May 1, 2020.
Comment: Some commenters sought clarification about how OIG will
consider the proposed factors and whether they will be weighted. Some
commenters requested additional detail on the range of potential
penalty amounts that OIG may issue and the circumstances or thresholds
that trigger such penalty amounts. For example, one commenter requested
a chart to show how different facts and circumstances would result in
different penalty amounts. This commenter also proposed that OIG set a
baseline penalty amount to provide guidance on how OIG would set
penalties for specific conduct. Some commenters requested clarification
on the circumstances and thresholds leading up to the maximum penalty
of $1 million. One commenter asked whether penalties assessed would be
per organization impacted by the information blocking or per patient
impacted by the information blocking.
Response: Our goal in setting penalty amounts is for a penalty to
be fair, reasonable, and commensurate with the conduct so that
wrongdoers are held accountable and future information blocking conduct
is deterred. Accordingly, setting penalty amounts necessitates
consideration of the particular facts of each case and does not lend
itself to one-size-fits-all formulas or thresholds. The amount of each
penalty will be determined per violation and will be based on the
aggravating and mitigating factors.
Section 3022(b)(2)(A) of the PHSA requires the consideration of the
number of providers affected and the number of patients affected when
evaluating the nature and extent of the information blocking and the
harm resulting from such information blocking. We consider the number
of providers affected and number of patients affected under 42 CFR
1003.1420. In evaluating the nature and extent of the violation, we may
also consider the number of organizations impacted by the information
blocking, in addition to the number of patients and providers
affected.\2\
---------------------------------------------------------------------------
\2\ We could consider the number of organizations under the
``nature and circumstances of the violation'' factor at 42 CFR
1003.140 or the ``nature and extent of information blocking'' at 42
CFR 1003.1420. As we discuss elsewhere in this section IV.A.5 of the
preamble, the factors set forth at 42 CFR 1003.140 may overlap at 42
CFR 1003.1420, but we would not double count them.
---------------------------------------------------------------------------
The penalty amount will be based on a case-specific application of
each identified aggravating and mitigating factor. Because penalty
amounts require case-by-case evaluation, we decline to set a baseline
penalty amount, set thresholds, or create a chart as commenters
requested. Similarly, in assessing a penalty amount, OIG may weigh the
aggravating and mitigating factors at 42 CFR 1003.140 and 1003.1420,
but this weighting will not follow a formula. Application of the
aggravating and mitigating factors will result in the penalty assessed
being fair and reasonable. We would expect that the maximum penalty of
$1 million per violation would apply to particularly egregious conduct.
Comment: Some commenters had concerns that when considering the
number of patients and number of providers affected, OIG would impose
lower penalty amounts for information blocking against smaller
entities, thereby incentivizing information blocking against smaller
entities. Other commenters raised concerns that the inclusion and
implementation of the ``number of days'' factor in determining CMP
amounts would result in an improperly low penalty amount for conduct
that had serious effects but did not last long.
Response: Section 3022(b)(2)(A) of the PHSA requires OIG to
consider, among other factors, the number of patients affected, the
number of providers affected, and the number of days the information
blocking persisted. As noted above, OIG's determination of a penalty
amount will not rely on a rigid formula for weighing those factors but
rather on a case-specific analysis of each identified aggravating and
mitigating factor. Nothing in these factors would require OIG to impose
a lower CMP amount for information blocking against small entities,
even when such entities have fewer patients and providers than larger
entities. OIG is mindful that information blocking against small
entities can have significant adverse impacts for the entities and
their patients and providers. For example, application of the factors
at 42 CFR 1003.1420(a) and (b) to the specific facts and circumstances
could result in a higher penalty because the information blocking had
significant, negative impacts even for short periods of time on an
individual or small entities. Moreover, if conduct results in
significant harm, including lasting harm to patients, OIG would
consider such harm as a potential aggravating factor when determining
the appropriate penalty amount.
Comment: Some commenters requested clarification about what OIG
considers to be ``harm resulting from'' information blocking. Some
commenters suggested OIG should interpret ``harm'' to mean physical
harm to a patient's
[[Page 42835]]
health and well-being and suggested that OIG also consider financial
harm that patients, providers, or third-party actors suffer as a result
of information blocking. Other commenters raised concerns that
intentional information blockers will be allowed to get away with
``near misses'' if OIG does not consider both the potential and actual
harm resulting from information blocking as aggravating factors.
Response: In the proposed rule, we stated that section
3022(b)(2)(A) of the PHSA mandates that OIG must take into
consideration factors such as the nature and extent of the information
blocking and the harm resulting from such information blocking
including, where applicable, the number of patients affected, the
number of providers affected, and the number of days the information
blocking persisted in determining the amount of a CMP. 85 FR 22987,
April 24, 2020. We proposed incorporating these factors at 42 CFR
1003.1420, and noted that these factors were like factors found in
other sections of part 1003. We did not propose a definition of
``harm'' in the proposed rule. We solicited comment on this factor and
other potential factors we should consider.
In response to commenters' suggestions regarding the types of harm
covered by Sec. 1003.1420(b), we agree that ``harm'' should cover both
physical and financial harm. Nothing in section 3022(b)(2)(B) of the
PHSA indicates that harm should be limited to only one type or a
specific type of harm. We are not finalizing a definition of the word
harm. We intend to interpret harm in accordance with its plain meaning,
ensuring that we can consider a range of harms that may result from
information blocking conduct. As we gain more experience investigating
and imposing CMPs for information blocking, we may add additional
factors related to specific types of harm through rulemaking.
We appreciate the concern regarding intentional information
blockers that might get away with ``near misses.'' We do not believe
this would be the case. The definition of information blocking applies
to conduct that is ``likely'' to interfere with the access, exchange,
or use of EHI, thus capturing conduct with a potential to cause harm.
With respect to determination of a penalty amount after information
blocking is established, as noted above OIG will consider a range of
aggravating factors and would not consider ``resulting in harm'' in
isolation.
6. Additional Comments
Comment: One commenter noted that the proposed rule stated
investigated parties may incur some costs in response to an OIG
investigation or enforcement action and encouraged OIG not to impose
CMPs unless OIG determined the party committed information blocking.
The commenter also asked how investigative fees are calculated in the
instance that investigated parties incur costs in response to an OIG
investigation or enforcement action.
Response: OIG will impose CMPs where appropriate and does not
separately charge costs to investigated parties as the comment
contemplates. OIG also does not reimburse investigated parties for
costs. We included estimated costs for investigated parties or subjects
in the proposed rule as part of our Regulatory Impact Analysis (RIA).
The costs described in the RIA only estimate the potential economic
impact of the proposed rule, which includes costs that a subject being
investigated may incur. For example, a party may incur costs in
preparing documents in response to a subpoena or hiring an attorney to
represent them during an investigation.
B. CMPs, Assessments, and Exclusions for Fraud or False Claims or
Similar Conduct Related to Grants, Contracts, and Other Agreements
The Cures Act amendments to the CMPL authorize the Secretary to
impose penalties, assessments, and exclusions for a variety of
fraudulent and other improper conduct related to HHS grants, contracts,
and other agreements. 42 U.S.C. 1320a-7a(o)-(s). In the proposed rule,
we proposed to incorporate this authority into 42 CFR parts 1003 and
1005, which is the existing regulatory framework for the imposition and
appeal of OIG penalties, assessments, and exclusions. We received
comments related to this authority on only three topics: (1) the
proposed definition of ``other agreement'' in 42 CFR 1003.110; (2) the
proposed aggravating and mitigating factors in 42 CFR 1003.720 that
will be used by OIG to determine the severity of the penalties,
assessments, and exclusions it imposes; and (3) OIG enforcement
priorities. We received no comments on the definitions we proposed to
add to 42 CFR 1003.110 except ``other agreement'' as noted above, and
are finalizing those definitions accordingly. We received no comments
on 42 CFR 1003.710, which identifies the maximum penalties and
assessments OIG may impose for fraud and other improper conduct
involving HHS grants, contracts, and other agreements. We also received
no comments on changes to 42 CFR 1003.130, 1003.1550, and 1003.1580,
which relate to the calculation and collection of assessments imposed
under this part and the use of statistical sampling. We finalize 42 CFR
1003.130, 1003.710, 1003.1550, and 1003.1580 as proposed without
modification accordingly. We received no comments on 42 CFR 1003.700,
which sets forth the bases for OIG's imposition of sanctions for fraud
and other improper conduct related to grants, contracts, and other
agreements, but are modifying 42 CFR 1003.700(a)(5) for clarity by
adding a citation to the existing regulatory definition of ``failure to
grant timely access'' at 42 CFR 1003.200(b)(10). We proposed, and are
finalizing, that the changes to 42 CFR 1003.110, 1003.130, 1003.700,
1003.710, 1003.720, 1003.1550, and 1003.1580 will be effective 30 days
from the publication date of the final rule.
1. Definition of ``Other Agreement''
In the proposed rule, we proposed adopting at 42 CFR 1003.110 the
statutory definition of ``other agreement'' that would apply to CMPs
brought under 42 CFR 1003.700. This definition includes but is not
limited to a cooperative agreement, scholarship, fellowship, loan,
subsidy, payment for a specified use, donation agreement, award, or
subaward (regardless of whether one or more of the persons entering
into the agreement is a contractor or subcontractor). 42 U.S.C. 1320a-
7a(q)(3). We noted in the proposed rule that this definition is broad
and identifies a nonexclusive list of arrangements that could
constitute ``other agreements'' under the statute. We stated that when
OIG investigates potential misconduct and decides whether to impose
sanctions, it will evaluate matters on a case-by-case basis to
determine whether the funding arrangement at issue constitutes an
``other agreement'' under the statute and whether the conduct at issue
violates the statute. We are finalizing the definition of ``other
agreement'' as proposed in 42 CFR 1003.110, without modification.
Comment: Several commenters requested that OIG provide more detail
on which arrangements could constitute ``other agreements'' under the
regulation. For example, one commenter asked OIG to provide additional
clarity on how OIG will determine which ``other agreements'' fall
within the meaning of the statute. Another commenter asked OIG to
provide specific examples of scenarios involving ``other agreements''
where it would apply its CMPL authority.
Response: The statutory definition of ``other agreement,'' which
has been
[[Page 42836]]
incorporated verbatim into 42 CFR 1003.110, is broad and defines
``other agreement'' to include (but not be limited to) a ``cooperative
agreement, scholarship, fellowship, loan, subsidy, payment for a
specified use, donation agreement, award, or subaward (regardless of
whether one or more of the persons entering into the agreement is a
contractor or subcontractor).'' It is not possible to identify with
specificity all the various types of agreements that may fall under the
definition of ``other agreement.'' The nine examples of ``other
agreement'' identified in the statute along with the text of 42 U.S.C.
1320a-7a(o)-(s) demonstrate that Congress intended ``other agreement''
to be read broadly to include, for example, not only those direct
agreements between the Secretary and recipients of HHS funding but also
agreements between recipients of HHS funding and subrecipients such as
subcontractors and subawardees. The definition of ``specified claim,''
for example, includes those requests for payment submitted by a
subawardee to an HHS awardee that is receiving funding directly from
the Secretary. 42 U.S.C. 1320a-7a(r). In addition, 42 U.S.C. 1320a-
7a(o)(2) permits OIG to impose sanctions upon an entity that, among
other things, creates false documents that are required to be submitted
in order to indirectly receive funds from the Secretary. Any person
that receives HHS funding directly or indirectly through an agreement
is potentially subject to liability under the CMPL if they engage in
any of the improper conduct identified in the regulation including but
not limited to making misrepresentations in applications for the
funding, presenting false or fraudulent specified claims related to the
funding, and creating false records related to the funding.
2. Factors in Mitigation and Aggravation
The regulation at 42 CFR 1003.720 of the proposed rule proposed
factors for OIG to consider in mitigation and aggravation when
determining the appropriate penalty, assessment, and period of
exclusion to impose upon persons who engage in fraud and other improper
conduct related to HHS grants, contracts, and other agreements. In 42
CFR 1003.720(a), for example, we proposed that OIG would consider
identifying as a mitigating factor a circumstance in which the amount
of funds involved with the improper conduct was less than $5,000. Then,
in 42 CFR 1003.720(b), we proposed considering as an aggravating factor
a circumstance in which the amount of funds involved was more than
$50,000. We are finalizing 42 CFR 1003.720 as proposed without
modification.
Comment: One commenter suggested that the proposed monetary
thresholds created in 42 CFR 1003.720(a) and (b) of $5,000 and $50,000
are too low and need to be adjusted upwards because they will lead to
overly harsh determinations for CMPL violations related to grants,
contracts, and other agreements that involve what the commenter
characterized as small amounts of HHS funding. The commenter suggested
that OIG consider it a mitigating factor in 42 CFR 1003.720(a) if the
amount of funds involved with the improper conduct was less than
$50,000 and consider it an aggravating factor in 42 CFR 1003.720(b) if
the amount of funds involved with the improper conduct was more than
$250,000.
Response: We are not accepting the commenter's suggestion to
upwardly adjust the monetary thresholds proposed in 42 CFR 1003.720(a)
and (b). The thresholds proposed in 42 CFR 1003.720(a) and (b) are the
same thresholds that exist under 42 CFR 1003.220 related to damages
sustained by HHS for fraud and similar conduct related to the Federal
health care programs. OIG believes it is important for 42 CFR 1003.720
and 1003.220 to be consistent because both provide guidelines for OIG
to evaluate the same factor and relate to damages sustained by HHS
programs as a result of fraud or similar conduct.
Comment: Two commenters requested that OIG consider as a mitigating
circumstance in an action for failure to grant timely access to OIG
under 42 CFR 1003.700(a)(5) whether a party acted in good faith in
attempting to comply with OIG's request for timely access in matters
involving HHS grants, contracts, or other agreements. The commenters
both pointed to challenges surrounding the current COVID-19 pandemic as
an example of a circumstance in which a party might act in good faith
in attempting to comply with OIG's request for access but might be
unable to comply with it.
Response: We are not adopting this suggestion. Existing mitigating
factors in 42 CFR 1003.140 that apply to all CMPs in 42 CFR part 1003
address commenters' request to assess whether the party acted in good
faith as a mitigating factor. As finalized, section 1003.720 identifies
factors in mitigation that OIG should consider when imposing sanctions
and states that those factors should be read in conjunction with the
factors listed in 42 CFR 1003.140. Section 1003.140 requires OIG to
consider in mitigation ``the degree of culpability'' of the person
against whom a sanction is imposed (42 CFR 1003.140(a)(2)), ``the
nature and circumstances of the violation'' (42 CFR 1003.140(a)(1)),
and ``such other matters as justice may require'' (42 CFR
1003.140(a)(5)). Under these existing mitigating factors, we would
account for a party's good faith in attempting to comply with an OIG
timely access request consistent with 42 CFR 1003.140(a)(1), (2), and
(5). Therefore, it is unnecessary to explicitly add good faith as a
mitigating factor to 42 CFR 1003.720.
3. OIG Enforcement Regarding Grants, Contracts, and Other Agreements
The regulation at 42 CFR 1003.700 identifies the grounds for OIG's
imposition of penalties, assessments, and exclusions for fraud and
other improper conduct related to HHS grants, contracts, and other
agreements, and sets forth the levels of intent required to violate
each offense. One commenter asked that OIG only exercise its discretion
to impose sanctions when it finds bad intent or other truly abusive,
egregious, and intentional wrongdoing. We are not adopting this
suggestion and are finalizing 42 CFR 1003.700 as proposed with
modification only to 42 CFR 1003.700(a)(5) as discussed below.
Comment: One commenter noted that many HHS grants, contracts, and
other agreements are complex and require specific and detailed
information from and actions by parties applying for the funds. The
commenter also noted that regulatory requirements sometimes change,
especially in times of a PHE such as the PHE for COVID-19, and that
complying with shifting requirements can be difficult. The commenter
asked that OIG take into consideration these complexities, ambiguities,
and shifting requirements when exercising its discretion in enforcing
the CMPs and that it do so only when the facts demonstrate bad intent
or other truly abusive, egregious, and intentional wrongdoing by the
parties applying for or receiving HHS funds.
Response: The CMPL authorizes the imposition of penalties,
assessments, and exclusions for a variety of fraudulent and other
improper conduct related to HHS grants, contracts, and other
agreements, and sets forth the levels of intent required to violate
each of the offenses it creates. 42 U.S.C. 1320a-7a(o). In determining
whether to impose sanctions and the severity of those sanctions, OIG
will consider all of the relevant facts and circumstances surrounding
an allegation of wrongdoing in light of the factors identified in the
CMPL (42 U.S.C.
[[Page 42837]]
1320a-7a(d)) and the regulation. 42 CFR 1003.140 and 1003.720.
Depending on the facts and circumstances of any particular case, it may
be appropriate for OIG to consider the difficulties raised by the
commenter, including those related to the PHE for COVID-19, in
determining whether a person has violated the CMPL and, if so, the
severity of the sanction OIG proposes to impose.
4. Modification to 42 CFR 1003.700(a)(5)
The regulation at 42 CFR 1003.700(a)(5) incorporates into part 1003
OIG's statutory authority under 42 U.S.C. 1320a-7a(o)(5) to impose
CMPs, assessments, and exclusions for the failure to grant timely
access to OIG for the purpose of audits, investigations, evaluations,
or other statutory functions of OIG in matters involving grants,
contracts, or other agreements. We stated in the proposed rule at 85 FR
22982 that 42 U.S.C. 1320a-7a(o)(5) largely mirrors the statutory
language that has for many years given OIG the authority to impose
sanctions for the failure to grant timely access to OIG related to
health care claims. Furthermore, we stated at 85 FR 22980 of the
proposed rule that it was our intent to incorporate into OIG's existing
CMP regulations the new CMP authorities related to fraud and other
misconduct involving HHS grants, contracts, and other agreements.
However, our proposed regulatory text at 42 CFR 1003.700(a)(5) omitted
a citation to the existing regulatory definition of ``failure to grant
timely access'' that is located at Sec. 1003.200(b)(10), in a section
of part 1003 that relates to fraud involving Federal health care
claims. Consistent with our intent to incorporate into part 1003 our
authority to impose sanctions for failure to grant timely access
related to grants, contracts, and other agreements, our view that this
authority mirrors the authority OIG has had for many years related to
health care claims and, for clarity, we are finalizing 42 CFR
1003.700(a)(5) with a cross-reference to the existing definition of
``failure to grant timely access'' to make clear that the definition of
that term at 42 CFR 1003.200(b)(10) is applicable to actions under 42
CFR 1003.700(a)(5).
C. The Bipartisan Budget Act of 2018
The BBA of 2018 amended the CMPL to increase certain CMP amounts
contained in 42 U.S.C. 1320a-7a(a) and (b). The BBA 2018 increased
maximum civil money penalties in section 1128A(a) of the SSA (42 U.S.C.
1320a-7a) from $10,000 to $20,000; from $15,000 to $30,000; and from
$50,000 to $100,000. The BBA 2018 increased maximum civil money
penalties in section 1128A(b) of the SSA from $2,000 to $5,000 in
paragraph (1), from $2,000 to $5,000 in paragraph (2), and from $5,000
to $10,000 in paragraph (3)(A)(i). This statutory increase in CMP
amounts is effective for acts committed after the date of enactment,
February 9, 2018. In the proposed rule, we proposed increasing the
civil money penalties in accordance with the BBA 2018. Specifically,
for conformity with the CMPL as amended by the BBA 2018, we proposed to
revise the civil money penalties contained at 42 CFR 1003.210,
1003.310, and 1003.1010.
The BBA 2018 increased penalty maximums for conduct that occurred
after February 9, 2018. Accordingly, for each of the provisions below,
we proposed language increasing the maximum penalty for conduct that
occurred after February 9, 2018, and maintaining the pre-BBA 2018
penalty maximums for conduct that occurred on or before that date. The
penalty amounts for conduct that occurred after February 9, 2018, in
proposed 42 CFR 1003.210 were as follows: $20,000 for paragraphs
(a)(1), (3), (4), and (8); $30,000 for paragraphs (a)(2) and (9);
$100,000 for paragraphs (a)(6) and (7); and $10,000 for paragraph
(a)(10)(i). Similarly, we proposed to increase the penalty maximum for
conduct that occurred after February 9, 2018, at 42 CFR 1003.310(a)(3)
to $100,000, and at 42 CFR 1003.1010(a) to $20,000. We received no
comments on this proposal and we are finalizing the penalty amounts as
proposed without modification, effective August 2, 2023 as required by
the Administrative Procedure Act (APA).
E. Additional Changes to Part 1003
We proposed to change the cross-reference in 42 1003.140(c)(3) to
correct a scrivener's error from a prior rulemaking on December 7,
2018. 81 FR 88354. We proposed to add a new paragraph (d)(5) to 42 CFR
1003.140 stating that the penalty amounts in part 1003 are adjusted
annually for inflation and eliminating the footnotes 1 through 12 in
part 1003 to simplify those sections. We received no comments on these
proposed changes, and we are finalizing them with a correction to a
typographical error in the regulatory text in the citation to the
Federal Civil Penalties Inflation Adjustment Act of 1990 (Pub. L. 101-
410) effective August 2, 2023.
F. Changes to 42 CFR Part 1005
The procedures set forth in part 1005 govern the appeal of CMPs,
assessments, and exclusions in all cases for which OIG has been
delegated authority to impose those sanctions including cases involving
grants, contracts, and other agreements, and information blocking. As
such, we proposed deleting the phrase ``under Medicare or the State
health care programs'' from the definitions of ``civil money penalty
cases'' and ``exclusion cases'' at 42 CFR 1005.1 to correctly define
those terms as applying to all cases for which OIG has been delegated
authority to apply CMPs, assessments, and exclusions not only to those
cases involving Medicare or the State health care programs. We received
no comments regarding this change and are finalizing it as proposed,
without modification, in 42 CFR 1005.1, effective August 2, 2023.
IV. Regulatory Impact Statement
We have examined the impact of this final rule as required by
Executive Order 12866, the Regulatory Flexibility Act (RFA) of 1980,
the Unfunded Mandates Reform Act of 1995, and Executive Order 13132.
A. Executive Order No. 12866
Executive Order 12866 directs agencies to assess all costs and
benefits of available regulatory alternatives and, if regulations are
necessary, to select regulatory approaches that maximize net benefits
(including potential economic, environmental, and public health and
safety effects; distributive impacts; and equity). A regulatory impact
analysis must be prepared for major rules with significant effects per
section 3(f)(1) of Executive Order 12866 (i.e., $200 million or more in
any given year). This is not a major rule as defined at 5 U.S.C.
804(2); it is not significant per section 3(f)(1) because it does not
reach that economic threshold. The vast majority of Federal health care
programs would be minimally impacted from an economic perspective, if
at all, by these proposals.
This final rule would enact new statutory enforcement provisions,
including new CMP authorities. The regulatory changes implement
provisions of the Cures Act and BBA 2018 into 42 CFR parts 1003 and
1005. We believe that the likely aggregate economic effect of these
regulations would be significantly less than $100 million.
The expected benefits of the regulation are deterring conduct that
negatively affects the integrity of HHS grants, contracts, and other
agreements and potentially enhanced statutory compliance by HHS
grantees, contractors, and other parties. It also will deter
information blocking conduct
[[Page 42838]]
that interferes with effective health information exchange and
negatively impacts many important aspects of health and health care. We
refer readers to the impact analysis of the benefits of prohibiting and
deterring information blocking in section XII.C.2.a.(4.2) of the ONC
Final Rule, 85 FR 25906, May 1, 2020.
We anticipate that OIG will incur some costs associated with
investigation and enforcement of the statutes underlying these penalty
provisions. The Consolidated Appropriations Act, 2022 appropriates to
OIG funding necessary for carrying out information blocking activities.
Public Law 117-103, March 15, 2022. Additionally, investigated parties
may incur some costs in response to an OIG investigation or enforcement
action. Absent information about the frequency of prohibited conduct,
we are unable to determine precisely the potential costs of this
regulation.
Civil money penalties and assessments, if any, would be considered
transfers. However, we are unable to reliably estimate potential
penalty and assessment amounts because enforcement action will depend
on the facts and circumstances of individual cases, some conduct
subject to enforcement will be newly regulated, and some cases may
result in settlement. We did not receive any comments on potential
impacts of the rulemaking.
B. Regulatory Flexibility Act
The RFA and the Small Business Regulatory Enforcement and Fairness
Act of 1996, which amended the RFA, require agencies to analyze options
for regulatory relief of small businesses. For purposes of the RFA,
small entities include small businesses, nonprofit organizations, and
Government agencies.
The Department considers a rule to have a significant impact on a
substantial number of small entities if it has an impact of more than 3
percent of revenue for more than 5 percent of affected small entities.
This final rule should not have a significant impact on the operations
of a substantial number of small entities, as these changes would not
impose any new requirement on any party. These changes largely enact
existing regulatory authority. In addition, we expect that increases in
the maximum penalty finalized here will only have an impact in a small
number of cases. As a result, we have concluded that this final rule
likely will not have a significant impact on a substantial number of
small entities and that a regulatory flexibility analysis is not
required for this rulemaking.
In addition, section 1102(b) of the SSA (42 U.S.C. 1302) requires
us to prepare a regulatory impact analysis if a rule under Titles XVIII
or XIX or section B of Title XI of the SSA may have a significant
impact on the operations of a substantial number of small rural
hospitals. We have concluded that this final rule should not have a
significant impact on the operations of a substantial number of small
rural hospitals because these changes would not impose any requirement
on any party and small rural hospitals are not subject to CMPs for
information blocking under this final rule. Therefore, a regulatory
impact analysis under section 1102(b) is not required for this
rulemaking.
C. Unfunded Mandates Reform Act
Section 202 of the Unfunded Mandates Reform Act of 1995, Public Law
104-4, also requires that agencies assess anticipated costs and
benefits before issuing any rule that may result in expenditures in any
one year by State, local, or Tribal governments in the aggregate, or by
the private sector, of $100 million, adjusted annually for inflation.
We believe that there are no significant costs associated with these
revisions that would impose any mandates on State, local, or Tribal
governments or the private sector that would result in an expenditure
of $158 million (after adjustment for inflation) or more in any given
year and that a full analysis under the Unfunded Mandates Reform Act is
not necessary.
D. Executive Order 13132
Executive Order 13132, Federalism, establishes certain requirements
that an agency must meet when it promulgates a rule that imposes
substantial direct requirements or costs on State and local
governments, preempts State law, or otherwise has federalism
implications. In reviewing this rule under the threshold criteria of
Executive Order 13132, we have determined that this final rule would
not significantly affect the rights, roles, and responsibilities of
State or local governments. Nothing in this final rule imposes
substantial direct requirements or costs on State and local
governments, preempts State law, or otherwise has federalism
implications. We are not aware of any State laws or regulations that
are contradicted or impeded by any of the provisions in this final
rule.
The Secretary is authorized by 42 U.S.C. 1320a-7a(o), which we
enact in the regulation at 42 CFR 1003.700, to impose CMPs and
assessments against individuals and entities that engage in fraud and
other improper conduct against specified State agencies that administer
or supervise the administration of grants, contracts, and other
agreements funded in whole or in part by the Secretary. Additionally,
42 U.S.C. 1320a-7a(f)(4) directs that these CMPs and assessments be
deposited into the Treasury of the United States. Amounts collected
under this authority could not be used to compensate a State for
damages it incurs due to improper conduct related to grants, contracts,
or other agreements funded by the Secretary that are administered or
supervised by specified State agencies.
However, neither 42 U.S.C. 1320a-7a nor this final rule preclude or
impede any State's authority to pursue actions against entities and
individuals that defraud or otherwise engage in improper conduct
related to grants, contracts, or other agreements funded by the
Secretary that are administered or supervised by specified State
agencies. For this reason, the Secretary's authority related to
specified State agencies will not have a substantial direct effect on
the States, on the relationship between the National Government and the
States, or on the distribution of power and responsibilities among the
various levels of government.
Based on OIG's prior approach to enforcement that involves State
programs and agencies, we also anticipate coordinating closely with the
relevant State authorities, which would provide States notice about the
improper conduct and the opportunity to pursue action under the State
authority.
V. Paperwork Reduction Act
These changes to parts 1003 and 1005 impose no new reporting
requirements or collections of information. Therefore, a Paperwork
Reduction Act review is not required.
List of Subjects
42 CFR Part 1003
Contracts, Fraud, Grant programs--health, Information blocking,
Penalties.
42 CFR Part 1005
Administrative practice and procedure.
For the reasons stated in the preamble, the Office of Inspector
General, Department of Health and Human Services, amends 42 CFR chapter
V, subchapter B, as follows:
[[Page 42839]]
PART 1003--CIVIL MONEY PENALTIES, ASSESSMENTS AND EXCLUSIONS
0
1. Revise the authority citation for part 1003 to read as follows:
Authority: 42 U.S.C. 262a, 300jj-52, 1302, 1320a-7, 1320a-7a,
1320b-10, 1395u(j), 1395u(k), 1395cc(j), 1395w-141(i)(3),
1395dd(d)(1), 1395mm, 1395nn(g), 1395ss(d), 1396b(m), 11131(c), and
11137(b)(2).
0
2. Amend Sec. 1003.100 by:
0
a. Revising paragraph (a); and
0
b. In paragraph (b)(1), adding ``(CMPs)'' following ``civil money
penalties'' and a semicolon following ``this part''.
The revision reads as follows:
Sec. 1003.100 Basis and purpose.
(a) Basis. This part implements sections 1128(c), 1128A, 1140,
1819(b)(3)(B), 1819(g)(2)(A), 1857(g)(2)(A), 1860D-12(b)(3)(E), 1860D-
31(i)(3), 1862(b)(3)(C), 1867(d)(1), 1876(i)(6), 1877(g), 1882(d),
1891(c)(1); 1903(m)(5), 1919(b)(3)(B), 1919(g)(2)(A), 1927(b)(3)(B),
1927(b)(3)(C), and 1929(i)(3) of the Social Security Act; sections
421(c) and 427(b)(2) of Public Law 99-660; section 201(i) of Public Law
107-188 (42 U.S.C. 1320a-7(c), 1320a-7a, 1320b-10, 1395i-3(b)(3)(B),
1395i-3(g)(2)(A), 1395w-27(g)(2)(A), 1395w-112(b)(3)(E), 1395w-
141(i)(3), 1395y(b)(3)(B), 1395dd(d)(1), 1395mm(i)(6), 1395nn(g),
1395ss(d), 1395bbb(c)(1), 1396b(m)(5), 1396r(b)(3)(B), 1396r(g)(2)(A),
1396r-8(b)(3)(B), 1396r-8(b)(3)(C), 1396t(i)(3), 11131(c), 11137(b)(2),
and 262a(i)); and section 3022 of the Public Health Service Act (42
U.S.C. 300jj-52).
* * * * *
0
3. Amend Sec. 1003.110 by:
0
a. Adding the definitions of ``Department,'' ``Obligation,'' ``Other
agreement,'' and ``Program beneficiary'' in alphabetical order;
0
b. Revising the definition of ``Reasonable request;'' and
0
c. Adding the definitions of ``Recipient,'' ``Specified claim,'' and
``Specified State agency'' in alphabetical order.
The revision and additions read as follows:
Sec. 1003.110 Definitions.
* * * * *
Department means the Department of Health and Human Services.
* * * * *
Obligation for the purposes of Sec. 1003.700 means an established
duty, whether or not fixed, arising from an express or implied
contractual, grantor-grantee, or licensor-licensee relationship for a
fee-based or similar relationship, from statute or regulation, or from
the retention of any overpayment.
Other agreement for the purposes of Sec. 1003.700 includes a
cooperative agreement, scholarship, fellowship, loan, subsidy, payment
for a specified use, donation agreement, award, or subaward (regardless
of whether one or more of the persons entering into the agreement is a
contractor or subcontractor).
* * * * *
Program beneficiary means--in the case of a grant, contract, or
other agreement designed to accomplish the objective of awarding or
otherwise furnishing benefits or assistance to individuals and for
which the Secretary provides funding--an individual who applies for or
who receives such benefits or assistance from such grant, contract, or
other agreement. Such term does not include--with respect to such
grant, contract, or other agreement--an officer, employee, or agent of
a person or entity that receives such grant or that enters into such
contract or other agreement.
Reasonable request with respect to Sec. Sec. 1003.200(b)(10) and
1003.700(a)(5) means a written request signed by a designated
representative of the OIG and made by a properly identified agent of
the OIG during reasonable business hours. The request will include:
(1) A statement of the authority for the request;
(2) The person's rights in responding to the request;
(3) The definition of ``reasonable request'' and ``failure to grant
timely access'' under this part;
(4) The deadline by which the OIG requests access; and
(5) The amount of the civil money penalty or assessment that could
be imposed and the effective date, length, and scope and effect of the
exclusion that would be imposed for failure to comply with the request,
and the earliest date that a request for reinstatement would be
considered.
Recipient for the purposes of Sec. 1003.700 means any person
(excluding a program beneficiary as defined in this section) directly
or indirectly receiving money or property under a grant, contract, or
other agreement funded in whole or in part by the Secretary, including
a subrecipient or subcontractor.
* * * * *
Specified claim means any application, request, or demand under a
grant, contract, or other agreement for money or property, whether or
not the United States or a specified State agency has title to the
money or property, that is not a claim (as defined in this section) and
that:
(1) Is presented or caused to be presented to an officer, employee,
or agent of the Department or agency thereof, or of any specified State
agency; or
(2) Is made to a contractor, grantee, or other recipient if the
money or property is to be spent or used on the Department's behalf or
to advance a Department program or interest, and if the Department:
(i) Provides or has provided any portion of the money or property
requested or demanded; or
(ii) Will reimburse such contractor, grantee, or other recipient
for any portion of the money or property which is requested or
demanded.
Specified State agency means an agency of a State government
established or designated to administer or supervise the administration
of a grant, contract, or other agreement funded in whole or in part by
the Secretary.
* * * * *
0
4. Revise Sec. 1003.130 to read as follows:
Sec. 1003.130 Assessments.
The assessment in this part is in lieu of damages sustained by the
Department, a State agency, or a specified State agency because of the
violation.
0
5. Amend Sec. 1003.140 by:
0
a. In paragraph (c)(3), removing the phrase ``(as defined by paragraph
(e)(2) of this section)'' and adding the phrase ``(as defined by
paragraph (d)(2) of this section)'' in its place.
0
b. Adding paragraph (d)(5).
The addition reads as follows:
Sec. 1003.140 Determinations regarding the amount of penalties and
assessments and the period of exclusion.
* * * * *
(d) * * *
(5) The penalty amounts in this part are updated annually, as
adjusted in accordance with the Federal Civil Penalties Inflation
Adjustment Act of 1990, as amended by the Federal Civil Penalties
Inflation Adjustment Act Improvements Act of 2015 (section 701 of Pub.
L. 114-74). Annually adjusted amounts are published at 45 CFR part 102.
0
6. Amend Sec. 1003.210 by revising paragraphs (a)(1) through (4) and
(6) through (9), (a)(10) introductory text, and (a)(10)(i) to read as
follows:
Sec. 1003.210 Amount of penalties and assessments.
(a) * * *
[[Page 42840]]
(1) Except as provided in this section, the OIG may impose a
penalty of not more than $10,000 for conduct that occurred on or before
February 9, 2018, and not more than $20,000 for conduct that occurred
after February 9, 2018, for each individual violation that is subject
to a determination under this subpart.
(2) The OIG may impose a penalty of not more than $15,000 for
conduct that occurred on or before February 9, 2018, and not more than
$30,000 for conduct that occurred after February 9, 2018, for each
person with respect to whom a determination was made that false or
misleading information was given under Sec. 1003.200(b)(2).
(3) The OIG may impose a penalty of not more than $10,000 for
conduct that occurred on or before February 9, 2018, and not more than
$20,000 for conduct that occurred after February 9, 2018, per day for
each day that the prohibited relationship described in Sec.
1003.200(b)(3) occurs.
(4) For each individual violation of Sec. 1003.200(b)(4), the OIG
may impose a penalty of not more than $10,000 for conduct that occurred
on or before February 9, 2018, and not more than $20,000 for conduct
that occurred after February 9, 2018, for each separately billable or
non-separately-billable item or service provided, furnished, ordered,
or prescribed by an excluded individual or entity.
* * * * *
(6) The OIG may impose a penalty of not more than $50,000 for
conduct that occurred on or before February 9, 2018, and not more than
$100,000 for conduct that occurred after February 9, 2018, for each
false statement, omission, or misrepresentation of a material fact in
violation of Sec. 1003.200(b)(7).
(7) The OIG may impose a penalty of not more than $50,000 for
conduct that occurred on or before February 9, 2018, and not more than
$100,000 for conduct that occurred after February 9, 2018, for each
false record or statement in violation of Sec. 1003.200(b)(9).
(8) The OIG may impose a penalty of not more than $10,000 for
conduct that occurred on or before February 9, 2018, and not more than
$20,000 for conduct that occurred after February 9, 2018, for each item
or service related to an overpayment that is not reported and returned
in accordance with section 1128J(d) of the Act in violation of Sec.
1003.200(b)(8).
(9) The OIG may impose a penalty of not more than $15,000 for
conduct that occurred on or before February 9, 2018, and not more than
$30,000 for conduct that occurred after February 9, 2018, for each day
of failure to grant timely access in violation of Sec.
1003.200(b)(10).
(10) For each false certification in violation of Sec.
1003.200(c), the OIG may impose a penalty of not more than the greater
of:
(i) $5,000 for conduct that occurred on or before February 9, 2018,
and $10,000 for conduct that occurred after February 9, 2018; or
* * * * *
0
7. Amend Sec. 1003.310 by revising paragraph (a)(3) to read as
follows:
Sec. 1003.310 Amount of penalties and assessments.
(a) * * *
(3) $50,000 for conduct that occurred on or before February 9,
2018, and $100,000 for conduct that occurred after February 9, 2018,
for each offer, payment, solicitation, or receipt of remuneration that
is subject to a determination under Sec. 1003.300(d).
* * * * *
0
8. Add subpart G (consisting of Sec. Sec. 1003.700, 1003.710, and
1003.720) to read as follows:
Subpart G--CMPs, Assessments, and Exclusions for Fraud or False
Claims or Similar Conduct Related to Grants, Contracts, and Other
Agreements
Sec.
1003.700 Basis for civil money penalties, assessments, and
exclusions.
1003.710 Amount of penalties and assessments.
1003.720 Determinations regarding the amount of penalties and
assessments and period of exclusion.
Sec. 1003.700 Basis for civil money penalties, assessments, and
exclusions.
The OIG may impose a penalty, assessment, and an exclusion against
any person including an organization, agency, or other entity, but
excluding a program beneficiary (as defined in Sec. 1003.110), that,
with respect to a grant, contract, or other agreement for which the
Secretary provides funding:
(a) Knowingly presents or causes to be presented a specified claim
(as defined in Sec. 1003.110) under such grant, contract, or other
agreement that the person knows or should know is false or fraudulent;
(b) Knowingly makes, uses, or causes to be made or used, any false
statement, omission, or misrepresentation of a material fact in any
application, proposal, bid, progress report, or other document that is
required to be submitted in order to directly or indirectly receive or
retain funds provided in whole or in part by such Secretary pursuant to
such grant, contract, or other agreement;
(c) Knowingly makes, uses, or causes to be made or used, a false
record or statement material to a false or fraudulent specified claim
under such grant, contract, or other agreement;
(d) Knowingly makes, uses, or causes to be made or used, a false
record or statement material to an obligation (as defined in Sec.
1003.110) to pay or transmit funds or property to such Secretary with
respect to such grant, contract, or other agreement, or knowingly
conceals or knowingly and improperly avoids or decreases an obligation
to pay or transmit funds or property to such Secretary with respect to
such grant, contract, or other agreement; or
(e) Fails to grant timely access (as defined in Sec.
1003.200(b)(10)), upon reasonable request (as defined in Sec.
1003.110), to the Inspector General of the Department, for the purpose
of audits, investigations, evaluations, or other statutory functions of
such Inspector General in matters involving such grants, contracts, or
other agreements.
Sec. 1003.710 Amount of penalties and assessments.
(a) Penalties. (1) In cases under Sec. 1003.700(a)(1), the OIG may
impose a penalty of not more than $10,000 for each specified claim.
(2) In cases under Sec. 1003.700(a)(2), the OIG may impose a
penalty of not more than $50,000 for each false statement, omission, or
misrepresentation of a material fact.
(3) In cases under Sec. 1003.700(a)(3), the OIG may impose a
penalty of not more than $50,000 for each false record or statement.
(4) In cases under Sec. 1003.700(a)(4), the OIG may impose a
penalty of not more than $50,000 for each false record or statement or
not more than $10,000 for each day that the person knowingly conceals
or knowingly and improperly avoids or decreases an obligation to pay.
(5) In cases under Sec. 1003.700(a)(5), the OIG may impose a
penalty of not more than $15,000 for each day of the failure described
in Sec. 1003.700(a)(5).
(b) Assessments. (1) In cases under Sec. 1003.700(a)(1) and (3),
such a person shall be subject to an assessment of not more than three
times the amount claimed in the specified claim described in Sec.
1003.700(a)(1) and (3) in lieu of damages sustained by the United
States or a specified State agency because of such specified claim.
(2) In cases under Sec. 1003.700(a)(2) and (4), such a person
shall be subject to an assessment of not more than three times the
total amount of the funds described in Sec. 1003.700(a)(2) and (4),
respectively (or, in the case of an obligation to transmit property to
the Secretary described in Sec. 1003.700(a)(4), of the
[[Page 42841]]
value of the property described in Sec. 1003.700(a)(4)) in lieu of
damages sustained by the United States or a specified State agency
because of such case.
Sec. 1003.720 Determinations regarding the amount of penalties and
assessments and period of exclusion.
In considering the factors listed in Sec. 1003.140:
(a) It should be considered a mitigating circumstance if all the
violations included in the action brought under this part were of the
same type and occurred within a short period of time, there were few
such violations, and the total amount claimed or requested related to
the violations was less than $5,000.
(b) Aggravating circumstances include but are not limited to:
(1) The violations were of several types or occurred over a lengthy
period of time;
(2) There were many such violations (or the nature and
circumstances indicate a pattern of false or fraudulent specified
claims, requests for payment, or a pattern of violations);
(3) The amount requested or claimed or related to the violations
was $50,000 or more; or
(4) The violation resulted, or could have resulted, in physical
harm to any individual.
Sec. 1003.1010 [Amended]
0
9. Amend Sec. 1003.1010 in paragraph (a) by removing the figure
``$10,000'' and adding in its place the phrase ``$10,000 for conduct
that occurred on or before February 9, 2018, and $20,000 for conduct
that occurred after February 9, 2018,''.
0
10. Effective September 1, 2023, add subpart N (consisting of
Sec. Sec. 1003.1400, 1003.1410, and 1003.1420) to read as follows:
Subpart N--CMPs for Information Blocking
Sec.
1003.1400 Basis for civil money penalties.
1003.1410 Amount of penalties.
1003.1420 Determinations regarding the amount of penalties.
Sec. 1003.1400 Basis for civil money penalties.
The OIG may impose a civil money penalty against any individual or
entity described in 45 CFR 171.103(a)(2) that commits information
blocking, as set forth in 45 CFR part 171.
Sec. 1003.1410 Amount of penalties.
The OIG may impose a penalty of not more than $1,000,000 per
violation.
(a) For this subpart, violation means a practice, as defined in 45
CFR 171.102, that constitutes information blocking, as set forth in 45
CFR part 171.
(b) [Reserved]
Sec. 1003.1420 Determinations regarding the amount of penalties.
In considering the factors listed in Sec. 1003.140, the OIG shall
take into account:
(a) The nature and extent of the information blocking including
where applicable:
(1) The number of patients affected;
(2) The number of providers affected; and
(3) The number of days the information blocking persisted; and
(b) The harm resulting from such information blocking including
where applicable:
(1) The number of patients affected;
(2) The number of providers affected; and
(3) The number of days the information blocking persisted.
Sec. 1003.1550 [Amended]
0
11. Amend Sec. 1003.1550 in paragraph (b) by removing the phrase
``where the claim'' and adding the phrase ``where the claim or
specified claim'' in its place.
0
12. Amend Sec. 1003.1580 by revising paragraph (a) to read as follows:
Sec. 1003.1580 Statistical sampling.
(a) In meeting the burden of proof in Sec. 1005.15 of this
chapter, the OIG may introduce the results of a statistical sampling
study as evidence of the number and amount of claims, specified claims,
and/or requests for payment, as described in this part, that were
presented, or caused to be presented, by the respondent. Such a
statistical sampling study, if based upon an appropriate sampling and
computed by valid statistical methods, shall constitute prima facie
evidence of the number and amount of claims, specified claims, or
requests for payment, as described in this part.
* * * * *
Sec. Sec. 1003.210, 1003.310, 1003.410, 1003.510, 1003.610, 1003.810,
1003.910, 1003.1010, 1003.110, 1003.1210, and 1003.1310 [Amended]
0
13. In addition to the amendments set forth above, in 42 CFR part 1003,
amend each section referenced in the first column of the following
table by removing the footnote referenced in the second column.
------------------------------------------------------------------------
Section Footnote
------------------------------------------------------------------------
1003.210(a) heading......................................... 1
1003.310(a) heading......................................... 2
1003.410(a) heading......................................... 3
1003.410(b)(2).............................................. 4
1003.510 introductory text.................................. 5
1003.610(a) introductory text............................... 6
1003.810 introductory text.................................. 7
1003.910.................................................... 8
1003.1010 introductory text................................. 9
1003.1110 introductory text................................. 10
1003.1210 introductory text................................. 11
1003.1310................................................... 12
------------------------------------------------------------------------
PART 1005--APPEALS OF EXCLUSIONS, CIVIL MONEY PENALTIES AND
ASSESSMENTS
0
14. The authority citation for part 1005 continues to read as follows:
Authority: 42 U.S.C. 405(a), 405(b), 1302, 1320a-7, 1320a-7a
and 1320c-5.
0
15. Amend Sec. 1005.1 by revising the definitions of ``Civil money
penalty cases'' and ``Exclusion cases'' to read as follows:
Sec. 1005.1 Definitions.
Civil money penalty cases refers to all proceedings arising under
any of the statutory bases for which the OIG has been delegated
authority to impose civil money penalties (CMPs).
* * * * *
Exclusion cases refers to all proceedings arising under any of the
statutory bases for which the OIG has been delegated authority to
impose exclusions.
* * * * *
Dated: June 26, 2023.
Xavier Becerra,
Secretary.
[FR Doc. 2023-13851 Filed 6-30-23; 8:45 am]
BILLING CODE 4152-01-P