Online Safety Community

Complementing MACRA and MIPS with HIPAA brings about better patient engagement

The Medicare Access and CHIP Reauthorization Act of 2015 (MACRA) is a federal Act that regulates the manner in which physicians have to be paid when they treat patients who come to them under Medicare. It modifies and supersedes the earlier legislation on this topic, namely the Balanced Budget Act, which was in force from 1997. 

From the time the Balanced Budget Act linked physician payments to budget cuts and economic growth; it has reduced physician payments by over a fifth. In contrast, MACRA introduces Merit based Incentive Payment System (MIPS) and Advanced Alternative Payment Models (APM's), which are “pay-for-performance” programs and are independent of the macroeconomic factors, upon which the earlier physician payments system was based.

Bringing about patient engagement is the basic purpose of MACRA

MACRA brings about patient engagement in a big way. This is one of the quintessential features of this legislation. MACRA uses advancing technologies to foster patient engagement tools that have become so essential a feature of the smart devices that the healthcare sector uses. Certified Electronic Health Record Technology (CEHRT) has enabled features such as availability of secure patient portals and encrypted text message and email products.

Because of this, patient engagement tools sent electronically by regular (unencrypted) email and text messaging include features such as appointment reminders, healthcare instructions, patient satisfaction surveys, and health and wellness newsletters and recall reminders. Since these are part of the regular use of technology in healthcare; HIPAA has enacted rules by which Protected Health Information (PHI) can be sent by unencrypted electronic transmission. This explains the clear and strong link between MACRA, MIPS and HIPAA.

The first set of HIPAA rules came into effect when the HIPAA Omnibus Rule was passed in September 2013. Guidances from the U. S. Department of Health and Human Services in 2014 and 2016 followed these rules.

Pervasive violations

Despite the good intentions with which these HIPAA Rules and guidances have been enacted; Providers and Covered Entities, and their Business Associates have been violating the HIPAA Rules for communicating with patients by unencrypted email and text message. Lack of knowledge of the rules among them is attributed as the main reason for this. It is noticed that most providers and Covered Entities and Business Associates have very little knowledge of what a PHI as defined by HIPAA really is.

The antidote to this problem is provided by HIPAA itself, in the form of HIPAA Rules and HHS/OCR guidance. This guidance provides a simple and easy-to-use, three-step Safe Harbor for using unencrypted email and text messaging to engage patients. The highlight of this three-step HIPAA Safe Harbor is that it precludes Covered Entities and Business Associates from any responsibility or liability for unauthorized access to Protected Health Information (PHI) in unencrypted emails and text messages during transmission and after receipt by the patient.

Clear learning about the three-step Safe Harbor

Understanding what this Safe Harbor is, and knowing how to apply it is very important for Covered Entities, Business Associates and providers. It is the only real means for them to stay compliant with the requirements set out in HIPAA and avoid causing violations to the HIPAA rules on communicating with patients by unencrypted email and text message.

This is the learning a webinar from MentorHealth, a leading provider of professional trainings for the healthcare industry, will be offering. The speaker at this session is Paul R. Hales, an expert on HIPAA Privacy, Security, Breach notification and Enforcement Rules with a national HIPAA consulting practice based in St. Louis and the author of all content in The HIPAA E-Tool, an Internet-based, Software as a Service product for health care providers and Business Associates. Please register for this webinar.

Putting the HIPAA Safe Harbor in proper perspective

An explanation of the three-step HIPAA Safe Harbor is the core of this learning session. Paul will break down the steps, which is the basis to making the process easy to follow.

He will cover the following areas in this this webinar for HIPAA Covered Entities and Business Associates:

  • MACRA-MIPS - Patient Engagement - the Required Objective: Protecting Patient Health Information and Measure: HIPAA Risk Analysis
  • A clear explanation of the simple 3 Step HIPAA Safe Harbor that protects Covered Entities (and Business Associates acting on their behalf) from liability related to Patient Engagement by unencrypted email and text messaging
  • HIPAA Law that covers unencrypted email and text messages - What emails and text messages are subject to HIPAA Law
  • What Protected Health Information (PHI) really is - according to HIPAA - a clear explanation of how HIPAA defines PHI - it's not just information about, for example, a diagnosis, disease, surgery or prescribed treatment
  • How a 2015 Federal Communications Commission Order about health care text messages added to confusion and what it really means - the 3 Step HIPAA Safe Harbor is the only text message Safe Harbor for Covered Entities and Business Associates
  • The absolute ban on unencrypted text messaging of PHI by Joint Commission in collaboration with the Centers for Medicare & Medicaid Services (CMS)
  • The interconnected liability of Covered Entities and Business Associates that provide unencrypted electronic patient engagement services like appointment reminders - and how both can protect themselves
  • Responsibility - and liability of Senior Management and Boards of Trustees.

Views: 6

Comment

You need to be a member of Online Safety Community to add comments!

Join Online Safety Community

Take our poll!

Take our poll!

Latest Activity

Adam Fleaming posted a blog post

When SSARS does and does not Apply to Preparation Engagements

The Statement on Standards for Accounting and Review Services (SSARS) is a section of the professional standards set out by The American Institute of CPA’s (AICPA), seeking to review earlier standards for reviewing and compiling financial statements and setting out the terms of engagement between the CPA’s and the parties. This section has…See More
13 hours ago
John Robinson shared their discussion on Twitter
13 hours ago
John Robinson posted a discussion

Risk Management Solutions

Risk is defined as the potential hazard, harm or side effect of an activity. Almost all activities come with some or another form of risk, which needs to be mitigated or eliminated. Risk management is a major issue for regulatory compliance professionals. Our resources directory is a medium that helps them understand and overcome challenges. A few ISO standards, such as ISO 9004 cover risk management.Risk Management is a key component of ISO 9004:2000There is an intricate link between ISO…See More
13 hours ago
John Robinson posted blog posts
14 hours ago

Forum

Risk Management Solutions

Risk is defined as the potential hazard, harm or side effect of an activity. Almost all activities come with some or another form of risk, which needs to be mitigated or eliminated. Risk management…Continue

Tags: risk, Banking, management, healthcare, Process

Started by John Robinson 13 hours ago.

Occupational Health and Safety 4 Replies

Health and safety are important aspects of an organisation’s smooth and effective functioning.  Did you know that workplace health & safety injuries cost Australian businesses over $60 billion…Continue

Tags: Safety, and, Health, Occupational

Started by WHS Solutions. Last reply by John Robinson yesterday.

Introduction to PEGA-PRPC

Pega/PRPC is a popular rules engine and BPM tool from Pega systems that is gaining good market share among large corporations. Architects and developers build the Pega/PRPC instance while…Continue

Tags: training, course, online, pega

Started by Soujanya Naganuri Oct 6.

Introduction to PEGA-PRPC

Pega/PRPC is a popular rules engine and BPM tool from Pega systems that is gaining good market share among large corporations. Architects and developers build the Pega/PRPC instance while…Continue

Tags: training, course, online, pega

Started by Soujanya Naganuri Oct 6.

Introduction to PEGA-PRPC

Pega/PRPC is a popular rules engine and BPM tool from Pega systems that is gaining good market share among large corporations. Architects and developers build the Pega/PRPC instance while…Continue

Tags: training, course, online, pega

Started by Soujanya Naganuri Oct 6.

Badge

Loading…

© 2017   Created by Safety Community.   Powered by

Badges  |  Report an Issue  |  Terms of Service