Health Care Matters

A Complimentary Newsletter From:

Law Offices Of David S. Barmak, LLC

Managing Risk for Long Term Care and Health Care Providers

Volume 12, Issue 3                               ADVERTISEMENT                                      MARCH 2011

In This Issue
Action Plan For Providers and Suppliers: Breach of Protected Health Information
Follow us on Twitter


Action Plan For Providers and Suppliers: Breach of Protected Health Information

The Philadelphia Inquirer recently reported that Keystone Mercy Health Plan and AmeriHealth Mercy Health Plan, two regional and sizeable insurance companies, lost a portable computer drive containing sensitive client information at a community health fair.  Neither insurance company is apologizing for having brought their members' unencrypted health information to the fair.   "By having this information readily available, we are able to save lives," said Donna Burtanger, vice president of communications for the firms.


Apparently company officials realized on September 20, 2010 that a portable drive containing the records of 285,691 Medicaid clients was missing.  When the companies announced the security breach, a statement said the records were on a "flash drive for use at community health fairs."  Burtanger also disclosed "That flash drive was never intended to leave the building."


The two insurance companies service 400,000 eastern Pennsylvania members on medical assistance. The insurers, she said, had been working to improve a method for allowing encrypted patient information to be available to company representatives at local health events. The drive was being used at headquarters to test the new system, she said. However, the information on the missing portable drive was not encrypted. It was also reported that the two companies had embarked on an initiative to encrypt all company data, including data on devices such as laptops or flash drives that would be used outside the building.


The September 20 incident occurred before the initiative was completed. The insurance companies would set up a booth at a community fair and when a member of the insurance carrier stopped by the booth, a representative of the insurance companies would check to see what the member's health history was; e.g.; when the member's last mammogram was, and then schedule an appointment for a mammogram. 


The representative was not sure where the flash drive was: lost, thrown away or possibly stolen. The majority of the missing records, 285,691, containing health-plan identification numbers and results of recent screenings, did not contain member names. A total of 2,203 records did contain names with varying combinations of addresses, member identification numbers, and telephone numbers. Names and all or part of Social Security numbers are included on 808 records. The representative said that free credit monitoring would be provided to those whose Social Security numbers were involved and that letters to members would be sent out announcing a toll-free number for assistance.



What Constitutes a Breach of PHI?


The Health Insurance Portability and Accountability Act (HIPAA) and the Health Information Technology for Economic and Clinical Health Act (HITECH) govern protected health information (PHI) privacy and security provisions.  In summary, Covered Entities, such as the above mentioned insurance companies, have a duty to mitigate, to the extent practicable, any harmful effect known to the Covered Entity and / or Business Associate of a use or disclosure of PHI in violation of its policies and procedures or the requirements of HIPAA, HITECH and applicable regulations.  If the Business Associate alone is aware of the breach, the Business Associate must report unauthorized uses, disclosures and security breaches to the Covered Entity.  Many states also require notice to the affected individual in the event of improper use or disclosure of PHI.


A breach of PHI is defined as the unauthorized acquisition, access, use or disclosure of PHI which compromises the security or privacy of the PHI.  "Unsecured PHI" refers to PHI that is not secured in accordance with certain technology or methodology specifically identified by the Department of Health and Human Services that makes the PHI unreadable, unusable or indecipherable to unauthorized individuals.  At this time, "secured" involves either encrypting or destroying the PHI.


What To Do If a Breach of PHI Occurs


If a breach does occur, the Covered Entity and / or the Business Associate must notify the affected individual  (and the Business Associate must notify the Covered entity if the latter is unaware of the breach) within a reasonable amount of time but no later than sixty (60) days after the discovery of the breach.


Individuals must be notified promptly by first-class mail at the last known address of the individual or by electronic mail if the individual has agreed to such means. Notification must be on-going in one or more mailings as information about the breach becomes available.


If there is out-of-date or insufficient contact information regarding the individual whose PHI has been inappropriately used or disclosed, a substitute form of notice is deemed to be acceptable. For example, if there are ten (10) or more such individuals, a posting must be placed on the home page of the web-site of the Covered Entity and / or Business Associate involved or notice must be placed in major print or broadcast media in geographic areas where the affected individuals of the breach most likely reside. A toll-free telephone number should also be included in the media or web notices. Individuals can then call to determine if their PHI is included in the breach. Telephone calls may also be used to communicate notice to affected individuals if time is of the essence. If more than five hundred (500) individuals have been affected by the breach of unsecured PHI, notice must be provided to major media outlets serving the geographical area affected.


The Covered Entity must notify the Department of Health and Human Services (DHHS) of unsecured PHI that has been acquired or disclosed in a breach. If five hundred (500) individuals or more have been affected, then notice to DHHS must be immediate. If less than five hundred (500), then the Covered Entity may maintain a disclosure log and submit such a log annually to DHHS.


The notice of breach must include the following:

  • a brief description of what happened including the date of the breach and the date of discovery of breach
  • a description of the types of unsecured PHI involved in the breach;
  • steps individuals affected by the breach should take to protect themselves from possible harm from the breach;
  • a brief description of what the Covered Entity and/or Business Associate is doing to investigate the breach, mitigate losses and protect the individual from repeated breach;
  • means for the affected individual to ask questions or information including a toll-free telephone, a web mailing address or e-mail address.


Mission Statement - Reduce Your Risk Now

Our firm is dedicated to helping health care providers, in particular long term care facilities and their insurers, reduce costs by minimizing the risk of adverse events.

We do this by being proactive (pre-litigation strategies). This includes training and education of employees, review of policies and procedures, implementing communication channels, getting feedback through interviews and focus groups, and continuous monitoring and auditing. Vital to employee education is documentation training and effective communication training. 
If an adverse event occurs, our response is promptly reactive (pre-litigation strategies). Mandatory, non-binding mediation is utilized whenever possible. Our goal is to quickly resolve disputes before they escalate and require resolution through the judicial system. To avoid a repeat occurrence, we continue staff training and education with a focus on prevention, as well as review and revise policies and procedures for greater effectiveness.
If a lawsuit is filed, the risk that existed has been realized (litigation strategies). Defense analysis, expert witnesses, focus groups, and mock trials are all part of litigation defense. Finally, implement post-litigation risk management strategies to remedy the situation.


A comprehensive Compliance Program (also known as a Risk Management Program) focuses on early intervention through training, communication, and policy review. Monitoring and auditing are key elements to reduce medical liability exposure and improve patient safety.


Our firm offers numerous specialty risk management programs including a pharmacy risk management program which involves the review of skilled nursing facility pharmacy contracts and monthly pharmacy bills, assistance in renegotiating pharmacy contracts with an effort to obtain favorable pricing, evaluate Medicaid pending claims for credit after residents become Medicaid approved and/or evaluate pricing for Medicaid pass thru drugs.


David S. Barmak, Esq. received his JD from Cornell University and BA from Duke University. He is licensed to practice and serves clients in the States of New Jersey, New York, Connecticut and Pennsylvania. Before making your choice of attorney, you should give this matter careful thought. The selection of an attorney is an important decision.

The recipient may, if the newsletter is inaccurate or misleading, report the same to the Committee on Attorney Advertising. 


For more information, please contact us:


Telephone (609) 688-0055
Fax (609) 688-1199

Copyright, 2011.  Law Offices Of David S. Barmak, LLC.  All rights reserved.
No portion of these materials may be reproduced by any means without the advance written permission of the author.