I first attended a lecture on the "upcoming" ICD-10 changes that were expected in 1991 (when the rest of the world started transitioning). On October 1, 2015, a mere 24 years and countless lectures later, the U.S. finally adopted ICD-10 (via ICD-10-CM and PCS, which are both unique to the U.S. at this time).
Q: What is the recommendation for retaining hard copies of medical records once they have been transferred to an EMR system?
A: This varies quite a bit depending on your storage capabilities and state retention laws. I am aware of some organizations that keep these records for 3?6 years (until the statute of limitations has run out), but this is a very conservative approach. I have also seen six months and one month. I would suggest ensuring you have a rigorous scanning quality control process to reassure yourself that you in fact have the scanned documents and they are readable. I would recommend that you keep the hard copies for at least one month after scanning. You might also want to consult legal counsel on this matter.
Editor's note: Simons, director of health information and privacy officer at Maine General Medical Center in Augusta, answered these questions. She is also a HIM Briefings advisory board member. This information does not constitute legal advice. Consult legal counsel for answers to specific privacy and security questions. Send your questions related to HIPAA compliance to Editor Jaclyn Fitzgerald at jfitzgerald@hcpro.com.
The Office of the Inspector General (OIG), which provides oversight of other government entities, released a report in September 2015, OCR Should Strengthen Its Followup of Breaches of Patient Health Information Reported by Covered Entities, that included recommendations on how the entity charged with administering the HIPAA privacy and security rules should improve.
When President Barack Obama issued Executive Order 13636 February 12, 2013, Dena Boggan, CPC, CMC, CHPC, took notice. Boggan is the HIPAA privacy and security officer for St. Dominic Hospital, a 535-bed, 27-clinic facility headquartered in Jackson, Mississippi.
Engaging the board
An August 2014 American Hospital Association (AHA) article, "Cybersecurity and Hospitals: What Hospital Trustees Need to Know About Managing Cybersecurity Risk and Response" (www.aha.org/content/14/14cybersecuritytrustees.pdf), reported that hospitals and healthcare are part of the United States' "critical infrastructure," meaning "their systems and assets are considered so vital to the country that their impairment as a result of a cyber attack would pose a threat to the nation's public health and safety."
That's why Boggan and St. Dominic found it critical to ensure they have a robust cybersecurity program. A major part of that program was to get the hospital's board of directors and board of trustees in the know about cybersecurity. Boggan notes that at some of the organizations that suffered major breaches of PHI, investigators found that board members were generally unaware that cybersecurity programs even existed.
"They had that deer caught in the headlights look when asked about their program," she recalls of her research.
The AHA recommended, Boggan says, that organizations get their board of directors in the know. She started by developing a cybersecurity overview for her board. She reports up to St. Dominic's compliance committee, which includes some board members.
"We gave them a good definition of what cybersecurity is and identified that board of directors and trustees need to be responsible for understanding, at a high level, their organization's cybersecurity risks and vulnerabilities," Boggan says. "They need to understand the security response plan that is in place, who in management is responsible for delivering that plan, and when it's appropriate for board insight over that plan."