The Health Information Technology for Economic and Clinical Health Act (HITECH Act) was signed into law as part of the American Recovery and Reinvestment Act (ARRA) in 2009.
The HITECH Act encourages the meaningful use of electronic health records (EHRs) by healthcare providers and their business associates.
Prior to the HITECH Act, healthcare organizations in the United States operated under the Health Insurance Portability and Accountability Act (HIPAA), which was designed to protect protected health information (PHI), improve health insurance affordability, and simplify hospital administration.
However, after 13 years in operation, it was obvious that HIPAA had some issues. Namely, the lack of encouragement to use EHRs and no real requirement for business associates of covered entities to protect sensitive information. These two issues are what led Congress to pass the HITECH Act in 2009.
The HITECH Act also tried to anticipate risks associated with the exchange of electronic protected health information (ePHI). It did this by introducing stronger enforcement measures for noncompliance with the HIPAA Security Rule and HIPAA Privacy Rule for covered entities and their business associates by mandating security audits of healthcare providers.
These audits determine whether a provider meets the minimum specified standards to be HIPAA compliant.
These stricter measures, along with a few other changes that you can read about below, closed the loopholes that allowed some entities to avoid complying with HIPAA rules.
Today, all healthcare providers and other covered entities must meet HITECH compliance requirements.
To comply with HITECH, you need to understand HIPAA compliance requirements. HIPAA compliance is defined under a set of rules, namely the HIPAA Privacy Rule, and HIPAA Security Rule, HIPAA Enforcement Rule.
In our opinion, the most important rule to understand is the HIPAA Privacy rule which outlines how protected health information (PHI) can be used and disclosed. The other rules are designed to support the Privacy Rule.
We'll outline the rule below but if you need more information, read our full post on the HIPAA Privacy Rule here.
PHI includes information, including demographic data, that relates to:
In effect, this means data that can be used to identify an individual or where there is reasonable proof that it could be used to. This means any common identifiers such as name, address, birth date, and Social Security Number fall under PHI.
HIPAA also recognizes covered entities range from small providers to large, multi-national healthcare organizations and have therefore built-in flexibility and scalability into the Privacy Rule to allow entities to analyze their needs and implement solutions appropriate for their environment, size, and resources.
There are still requirements that all HIPAA covered entities must comply with:
Learn how to comply with HIPAA's third-party risk requirements.
While HIPAA regulation laid the groundwork for PHI protection and healthcare improvements, it wasn't comprehensive enough and didn't account for the impact that technology would have on the healthcare system:
The HITECH Act had four main objectives which are outlined in its four subtitles:
In 2006, nearly 9 out of 10 doctors used paper documents to record patient medical history, past treatment, and other healthcare information.
As of 2017, this trend has reversed with nearly 9 out of 10 doctors using some form of electronic health records.
While this was designed to improve patient outcomes and reduce the cost of care, it also introduced significant security risk in the form of data breaches and data leaks. Not only do these security incidents impact patients, but they also impact healthcare organizations. Healthcare has the highest industry average cost of a data breach at $6.45 million.
This is why the HITECH Act introduced mandatory data breach notification requirements and tougher penalties for accidental or wilful neglect of compliance requirements.
Follow this checklist to implement a HIPAA compliance program.
There are six main components of the HITECH Act:
The Meaningful Use Program was created by the Department of Health and Human Services (HHS) to incentivise the adoption of EHRs by providing compensation to healthcare providers for adopting and using them in a meaningful way.
According to the Centers for Disease Control and Prevention (CDC), the concept of meaningful use rests on the five pillars of health outcome policy priorities:
In practice this means:
As of 2017, healthcare providers who do not comply face a 3% reduction in Medicare and Medicaid fees.
Under HIPAA, business associates were supposed to have a contractual obligation to comply with compliance requirements. However, this was easily circumvented by covered entities who could claim they didn't know a business associate wasn't compliant.
This meant that PHI handled by business associates could be at risk, as they had no real need to comply with privacy or security regulations.
The HITECH Act changed this by introducing strict requirements for business associate agreements that made them liable for violations including:
The downside of increased EHR usage is a higher risk of cybercrime, particularly phishing or other cyber attacks. Without adequate measures, the number of data breaches was likely to rise.
The HITECH Act increased security requirements and penalties for noncompliance in an attempt to mitigate this risk. It also introduced mandatory data breach requirements under the Breach Notification Rule.
The Breach Notification Rule requires HIPAA covered entities and business associates to provide notification following a breach of unsecured protected health information.
A breach is, generally, an impermissible use or disclosure under the Privacy Rule that compromises the security or privacy of the protected health information. It is not considered a breach if it can be demonstrated that there is a low probability that the protected health information has been compromised based on a risk assessment of at least the following factors:
If a breach has occurred, the public must be notified. The notification method depends on the number of people impacted.
For breaches under 500 people, the covered entity must notify individuals within 60 days with a letter containing:
For breaches involving more than 500 individuals, in addition to the above, covered entities must:
Finally, for breaches affecting more than 500 individuals in a State of jurisdiction, in addition to the above steps, covered entities must:
The HITECH Act also gave the HHS's Office for Civil Rights (OCR) the power to audit HIPAA covered entities and business associates to ensure HIPAA compliance.
Along with the power to audit, they have a tiered violation penalty and fine system:
The HITECH Act also gives state Attorney Generals the power to leverage fines and seek attorney fees from covered entities on behalf of victims. Courts also have the ability to award costs.
As noted above, the HITECH Act closed HIPAA loopholes and introduced stricter penalties for noncompliance. Prior to HITECH, fines were smaller and many organizations found it cheaper to ignore HIPAA compliance requirements and simply pay fines rather than invest in security.
The Act has since been expanded by the HHS with the HIPAA Omnibus Rule which made modifications to HIPAA in accordance with guidelines set out in 2009 by the HITECH Act.
These guidelines concern the responsibilities of business associates of covered entities. The omnibus rule also increased penalties for HIPAA compliance violations to a maximum of $1.5 million per incident.
Prior to the HITECH Act, the HIPAA Privacy Rule gave patients and health plan members a right of access which allowed them to obtain copies of their health information by formal request.
However, with the introduction of EHRs, HITECH changed the right of access to allow individuals to access their health data in electronic if desired. This made it easier for individuals to share their health data with other organizations.
The HITECH Act called for the HHS' Office for Civil Rights (OCR) to start publishing a summary of healthcare breaches reported by HIPAA covered entities and their business associates.
As of October 2009, OCR publishes breach summaries on its website which include:
There are several factors when thinking through HITECH compliance:
For the assessment of your information security controls, UpGuard Breach Risk can monitor your organization for 70+ security controls providing a simple, easy-to-understand cyber security rating and automatically detect leaked credentials and data exposures in S3 buckets, Rsync servers, GitHub repos, and more.
UpGuard Vendor Risk can minimize the amount of time your organization spends assessing related and third-party information security controls by automating vendor questionnaires and providing vendor questionnaire templates.
We can also help you instantly benchmark your current and potential vendors against their industry, so you can see how they stack up.
The major difference between UpGuard and other security ratings vendors is that there is very public evidence of our expertise in preventing data breaches and data leaks.
Our expertise has been featured in the likes of The New York Times, The Wall Street Journal, Bloomberg, The Washington Post, Forbes, Reuters, and TechCrunch.
You can read more about what our customers are saying on Gartner reviews.