HIPAA PRIVACY POLICY

Introduction

Buettner Insurance Agency, Inc (the “Business Associate”) provides services to a number of covered entities, as defined under the Health Insurance Portability and Accountability Act of 1996 (“HIPAA”).  Members of the Business Associate’s workforce may have access to the individually identifiable health information of the covered entities’ participants (1) on behalf of the cover entities; or (2) on behalf of the employer who sponsors covered entities, for administrative functions of the covered entities.

HIPAA as amended by the Health Information Technology for Economic and Clinical Health (HITECH) Act and its implementing regulations restrict the Business Associate’s’ ability to use and disclose protected health information (PHI) for these covered entities.

Protected Health Information.  Protected health information means information that is created or received by the covered entities and relates to the past, present, or future physical or mental health or condition of a participant of these covered entities; the provision of health care to a participant of a covered entity; or the past, present, or future payment for the provision of health care to a participant of a covered entity; and that identifies the participant of a covered entity or for which there is a reasonable basis to believe the information can be used to identify the participant.  Protected health information includes information of persons living or deceased.

It is the Business Associate’s policy to comply fully with HIPAA’s requirements.  To that end, all members of the Business Associate’s workforce who have access to PHI must comply with this Privacy Policy and Procedures.  For purposes of this Policy, the Business Associate’s workforce includes individuals who would be considered part of the workforce under HIPAA such as employees, volunteers, trainees, and other persons whose work performance is under the direct control of the Business Associate, whether or not they are paid by the Business Associate.  The term “employee” includes all of these types of workers.

Additionally, any subcontractors that provide services to the Business Associate which involve the creation, receipt, maintenance, or transmission of private health information on behalf of the Business Associate to fulfill its contractual duties, must comply fully with HIPAA’s requirements. 

No third party rights (including but not limited to rights of covered entities’ participants, beneficiaries, covered dependents, or other business associates) are intended to be created by this Policy.  The Business Associate reserves the right to amend or change this Policy at any time (and even retroactively) without notice.  To the extent this Policy establishes requirements and obligations above and beyond those required by HIPAA, the Policy shall be aspirational and shall not be binding upon the Business Associate.  This Policy does not address requirements under other federal laws or under state laws. To the extent that this policy is in conflict with the HIPAA privacy rules shall govern.

Business Associate’s Responsibilities

I. Compliance Official and Contact Person

A Managing Partner will be the Compliance Official for the Business Associate.

The Compliance Official will be responsible for the development and implementation of policies and procedures relating to privacy, including but not limited to this Privacy Policy and any other use and disclosure procedures.  The Compliance Official will also appoint those employees who will serve as the contact persons for participants of the covered entities who have questions, concerns, or complaints about the privacy of their PHI.

The Compliance Official is responsible for the development and implementation of the organization’s security responsibilities.  The Compliance Official shall be assigned the responsibility to manage and supervise the execution and use of security measures to protect the Business Associate’s data and to manage and supervise personnel in relation to the protection of this data.  The Compliance Official shall develop procedures as appropriate for these responsibilities.  These responsibilities include:

  • An oversight process for systems certification. 
  • A coordinated contingency plan. 
  • A process to oversee information access control standards.
  • Monitor internal audit controls of system records activity and respond to variances. 
  • Maintenance of personnel authorization controls and clearance records. 
  • A process to oversee Security Configuration Management.
  • A process to oversee Security Incident Procedures.
  • A process to oversee the Security Management Process including Risk Analysis and Risk Management provisions.
  • Coordinate termination and/or modification of access to information systems.
  • Provide technical assistance for universal security awareness training.
  • Process to oversee Media Controls.

The Business Associate will maintain strict physical access controls to its information systems at all times and under all conditions.  This includes the physical security of electronic and paper data.  The Compliance Official is responsible for maintaining procedures to address these controls.  Physical access controls include the following:

  • Disaster recovery.
  • Emergency mode operation. 
  • Equipment and media control.
  • A facility security plan and procedures for verifying access authorizations prior to granting physical access.
  • Maintenance records. 
  • Sign-in procedure for visitors to sensitive areas, and escorts if appropriate. 
  • Testing and revision of physical access control covered entities periodically.

II. Workforce Training

It is the Business Associate’s policy to train all members of its workforce on its privacy policies and procedures.  The Compliance Official is charged with developing training schedules and programs so that all workforce members receive the training necessary and appropriate to permit them to carry out their functions within the Plan.

All members of the Business Associate’s workforce, including temporary staff, students and volunteers, will receive training in the policies and procedures that apply to their jobs, including maintenance of the privacy and security of PHI.  New members of the workforce will receive training as a part of orientation to their jobs within a reasonable time of joining the workforce.  All members of the workforce will receive additional training as policies and procedures are changed, to the extent that the changes affect their jobs.

Attendance and testing at training sessions will be documented to demonstrate that each member of the workforce has received and understood training in accordance with this policy.  The documentation must be retained for seven years.

Training sessions will include the following:

  • Awareness training:  threats to the privacy and security of PHI, how failure to protect against these threats can harm individuals, and the importance of each member of the workforce in the privacy and security posture of the Business Associate.
  • Details of applicable policies and procedures:  how privacy and security policies affect the job of each member of the workforce, and how the Business Associate defines what is expected of each of these workers.
  • Periodic reminders.
  • Timely information about changes in policies and procedures.
  • Information about sanctions:  how members of the workforce may be sanctioned under the Business Associate’s policy, and under state and federal law, for breaches of privacy and security policies.
  • Testing:  to measure comprehension and retention of the material.

The Business Associate will also ensure that any subcontractors that create, receive, maintain, or transmit protected health insurance on behalf of the Business Associate agree to comply with the same HIPAA restrictions, conditions, and requirements that apply to the Business Associate.

III. Administrative, Technical and Physical Safeguards and Firewall

The Business Associate will establish on behalf of the covered entities appropriate administrative technical and physical safeguards to prevent PHI from intentionally or unintentionally being used or disclosed in violation of HIPAA’s requirements. Administrative safeguards including procedures for use and disclosure of PHI. Technical safeguards include limiting access to information by creating computer firewalls.  Physical safeguards include locking doors or filing cabinets.

Firewalls will ensure that only authorized employees will have access to PHI, that they will have access to only the minimum amount of PHI necessary for plan administrative functions, and that they will not further use or disclose PHI in violation of HIPAA’s privacy rules.

IV. Privacy Notice

The Compliance Official is responsible for developing and maintaining a notice of the Business Associate’s privacy practices that describes:

•       the uses and disclosures of PHI that may be made by the Business Associate;

•       the individual’s rights under the HIPAA privacy rules;

•       the Business Associate’s legal duties with respect to the PHI; and

•       other information as required by the HIPAA privacy rules.

The privacy notice will inform employees that the Business Associate will have access to PHI in connection with its administrative functions with clients. The privacy notice will also provide a description of the Business Associate’s complaint procedures, the name and telephone number of the contact person for further information, and the date of the notice.

The notice of privacy practices will be individually delivered to all employees of the Business Associates:

•       at the time of an individual’s hire date; and

•       within 60 days after a material change to the notice.

The Business Associate will also provide notice of availability of the privacy notice (or a copy of the privacy notice) at least once every three years in compliance with the HIPAA privacy regulations.

V. Complaints

_____________________________ [insert name], ______________________________ [insert title], (_____) ____-_____ [insert phone number] and _____________________________ [insert name], ______________________________ [insert title], (_____) ____-_____ [insert phone number] will be the Business Associate’s contact persons for receiving complaints.

The Compliance Official is responsible for creating a process for individuals to lodge complaints about the Business Associate’s privacy procedures and for creating a system for handling such complaints.  A copy of the complaint procedure shall be provided to any participant upon request.

VI. Sanctions for Violations of Privacy Policy

Sanctions for using or disclosing PHI in violation of this HIPAA Privacy Policy will be imposed in accordance with the Business Associate’s policy/procedures.  Violations that jeopardize the privacy or security of PHI are particularly serious.  This seriousness will be reflected in the nature of the disciplinary action, up to and including termination of employment.

  • All members of the workforce will be treated fairly and equitably in the imposition of sanctions for privacy and security violations.
  • Sanctions will be integrated into the Business Associate’s overall employee discipline policy/procedures.
  • Disciplinary actions due to breaches of privacy or security of PHI will be documented, and the documentation must be retained for seven years.  Disclosure of PHI in violation of policy is reportable under the Policies on Individual Rights, Accounting section of this policy.

VII. Mitigation of Inadvertent Disclosures of Protected Health Information

The Business Associate shall mitigate, to the extent possible, any harmful effects that become known to it of a use or disclosure of an individual’s PHI in violation of the policies and procedures set forth in this Policy.  As a result, if an employee becomes aware of a disclosure of PHI, either by an employee of the Business Associate or an outside consultant/contractor, that is not in compliance with this Policy, immediately contact a Managing Partner so that the appropriate steps to mitigate the harm to the participant can be taken.

VIII. No Intimidating or Retaliatory Acts; No Waiver of HIPAA Privacy

No employee may intimidate, threaten, coerce, discriminate against, or take other retaliatory action against individuals for exercising their rights, filing a complaint, participating in an investigation, or opposing any improper practice under HIPAA.

No individual shall be required to waive his or her privacy rights under HIPAA as a condition of treatment, payment, enrollment or eligibility.

IX. Documents or Agreements

All documents or agreements shall include provisions to describe the permitted and required uses and disclosures of PHI by the Business Associate for administrative purposes.  Specifically, any documents or agreements shall require the Business Associate to:

  • Not use or further disclose PHI other than as permitted by the  documents or as required by law;
  • Ensure that any agents or subcontractors to whom it provides PHI received from the Business Associate agree to the same restrictions and conditions that apply to the Business Associate;
  • Not use or disclose PHI for employment-related actions or in connection with any other employee benefit plan;
  • Report to the designated contact persons of the covered entities any use or disclosure of the information that is inconsistent with the permitted use or disclosure and, if necessary, report such use or disclosure to the Department of Health and Human Services (“HHS”),as required  by HITECH and subsequent regulations;
  • Make PHI available to covered entities, consider their amendments and, upon request, provide them with an accounting of PHI disclosures;
  • Make the Business Associate’s internal practices and records relating to the use and disclosure of PHI received from the covered entities available to the DHHS upon request;
  • If feasible, return or destroy all PHI received from the covered entities that the Business Associate still maintains in any form and retain no copies of such information when no longer needed for the purpose for which disclosure was made, except that, if such return or destruction is not feasible, limit further uses and disclosures to those purposes that make the return or destruction of the information infeasible; and.
  • Provide access to electronic PHI to an individual, his/her designee or a covered entity.

All documents or agreements must also require the Business Associate to (1) certify to the Compliance Official that the documents or agreements have been amended to include the above restrictions and that the Business Associate agrees to those restrictions; and (2) provide adequate firewalls.

X. Documentation

The covered entities’ and the Business Associate’s privacy policies and procedures shall be documented and maintained for at least six years.  Policies and procedures must be changed as necessary or appropriate to comply with changes in the law, standards, requirements and implementation specifications (including changes and modifications in regulations).  Any changes to policies or procedures must promptly be documented.

If a change in law impacts the privacy notice, the privacy policy must promptly be revised and made available.  Such change is effective only with respect to PHI created or received after the effective date of the notice.

The covered entities and the Business Associate shall document certain events and actions (including authorizations, requests for information, sanctions, and complaints) relating to an individual’s privacy rights.

The documentation of any policies and procedures, actions, activities and designations may be maintained in either written or electronic form.  Covered entities must maintain such documentation for at least six years.

Policies on Use and Disclosure of PHI

I. Use and Disclosure Defined

The Business Associate and the covered entities will use and disclose PHI only as permitted under HIPAA.  The terms “use” and “disclosure” are defined as follows:

  • Use.  The sharing, employment, application, utilization, examination, or analysis of individually identifiable health information by any person working for or within the Business Associate, or by the Business Associate (on behalf of the covered entities).
  • Disclosure.  For information that is PHI, disclosure means any release, transfer, provision of access to, or divulging in any other manner of individually identifiable health information to persons not employed by or working within the Business Associate.

II. Workforce Must Comply With Business Associate’s Policy and Procedures

All members of the Business Associate’s workforce (described at the beginning of this Policy and referred to herein as “employees”) must comply with this Policy and with any relevant procedures.

III. Access to PHI Is Limited to Certain Employees

The following employees (“employees with access”) have access to PHI:

  • Any employee who performs functions directly on behalf of the covered entities; and
  • Officers, Managing Partners, Account Managers, and Account Coordinators who has access to PHI on behalf of the Business Associate for its use in “plan administrative functions” of the covered entities.

The same employees may be named or described in both of these two categories.  These employees with access may use and disclose PHI for plan administrative functions, and they may disclose PHI to other employees with access for plan administrative functions (but the PHI disclosed must be limited to the minimum amount necessary to perform the plan administrative function).  Employees with access may not disclose PHI to employees (other than employees with access) unless an authorization is in place or the disclosure otherwise is in compliance with this Policy and any associated procedures. For purposes of this Policy, “plan administrative functions” include the payment and health care operation activities described in this section of this Policy.

IV. Permitted Uses and Disclosures: Payment and Health Care Operations

PHI may be disclosed for the covered entities’ own payment purposes, and PHI may be disclosed to another business associate for the payment purposes of that covered entity associate.

Payment.  Payment includes activities undertaken to obtain covered entities’ contributions or to determine or fulfill the covered entities’ responsibility for provision of benefits under the Plan, or to obtain or provide reimbursement for health care.  Payment also includes:

  • eligibility and coverage determinations including coordination of benefits and adjudication or subrogation of health benefit claims;
  • risk adjusting based on enrollee status and demographic characteristics;
  • billing, claims management, collection activities, obtaining payment under a contract for reinsurance (including stop-loss insurance and excess loss insurance) and related health care data processing; and
  • any other payment activity permitted by HIPAA regulations

PHI may be disclosed for purposes of the covered entities’ own health care operations.  PHI may be disclosed to another business associate for purposes of the other business associate’s quality assessment and improvement, case management, or health care fraud and abuse detection programs, if the other business associate has (or had) a relationship with the participant and the PHI requested pertains to that relationship.

Health Care Operations.  Health care operations means any of the following activities to the extent that they are related to the covered entity’s administration:

  • Conducting quality assessments and improvement activities;
  • Reviewing health plan performance;
  • Underwriting and premium rating;
  • Conducting or arranging for medical review, legal services and auditing functions;
  • Business planning and development;
  • Business management and general administrative activities;
  • To de-identify the information in accordance with HIPAA Privacy Rules as necessary to perform those services required; and
  • Any other payment activity permitted by the HIPAA privacy regulations

V. No Disclosure of PHI for Non-Health Plan Purposes

PHI may not be used or disclosed for the payment or operations of the employer’s “non-health” benefits (e.g., disability, workers’ compensation, life insurance, etc.), unless the participant has provided an authorization for such use or disclosure (as discussed in “Disclosures Pursuant to an Authorization”) or such use or disclosure is required by applicable state law and particular requirements under HIPAA are met.

VI. Mandatory Disclosures of PHI: to Individual and HHS

A participant’s PHI must be disclosed as required by HIPAA in three situations:

  • The disclosure is to the individual who is the subject of the information (see the policy for “Access to Protected Information and Request for Amendment” that follows);
  • The disclosure is required by law; or 
  • The disclosure is made to HHS for purposes of enforcing of HIPAA.

VII. Permissive Disclosures of PHI: for Legal and Public Policy Purposes

PHI may be disclosed in the following situations without a participant’s authorization, when

specific requirements are satisfied.  The requirements include prior approval of the Business Associate’s Compliance Official.  Permitted are disclosures:

  • About victims of abuse, neglect or domestic violence;
  • For judicial and administrative proceedings;
  • For law enforcement purposes;
  • For public health activities;
  • For health oversight activities;
  • About decedents;
  • For cadaveric organ, eye or tissue donation purposes;
  • For certain limited research purposes;
  • To avert a serious threat to health or safety;
  • For specialized government functions; and
  • That relate to workers’ compensation programs.

VIII. Disclosures of PHI Pursuant to an Authorization

PHI may be disclosed for any purpose if an authorization that satisfies all of HIPAA’s requirements for a valid authorization is provided by the participant.  All uses and disclosures made pursuant to a signed authorization must be consistent with the terms and conditions of the authorization.

IX. Complying With the “Minimum-Necessary” Standard

HIPAA requires that when PHI is used or disclosed, the amount disclosed generally must be limited to the “minimum necessary” to accomplish the purpose of the use or disclosure.

The “minimum-necessary” standard does not apply to any of the following:

  • Uses or disclosures made to the individual;
  • Uses or disclosures made pursuant to a valid authorization;
  • Disclosures made to HHS;
  • Uses or disclosures required by law; and
  • Uses or disclosures required to comply with HIPAA.

Minimum Necessary When Disclosing PHI.  For making disclosures of PHI that are routine and recurring, such policies and procedures will be in place that limit the amount disclosed to the minimum amount necessary.

All other disclosures must be reviewed on an individual basis with the Compliance Official to ensure that the amount of information disclosed is the minimum necessary to accomplish the purpose of the disclosure.

Minimum Necessary When Requesting PHI.  For making requests for disclosure of PHI from any disclosing business associate for purposes of requests that are routine and recurring, such policies and procedures shall be designed to limit the amount requested to the amount reasonably necessary to accomplish the purpose for which the disclosure is requested.

All other requests must be reviewed on an individual basis with the Compliance Official to ensure that the amount of information requested is the minimum necessary to accomplish the purpose of the disclosure.

X. Disclosures of PHI to Other Business Associates or Vendors

Employees of the Business Associate may disclose PHI to the covered entities’ other business associates and allow the covered entities’ other business associates to create or receive PHI on its behalf.  However, prior to doing so, the covered entities must first obtain assurances from the other business associates that it will appropriately safeguard the information.  Before sharing PHI with outside consultants or contractors who meet the definition of a “business associate,” employees of the Business Associate must contact the Compliance Official and verify that a business associate contract is in place.

Other business associates are a business associate that:

  • Performs or assists in performing a business associate function or activity involving the use and disclosure of PHI (including claims processing or administration, data analysis, underwriting, etc.);
  • Provides legal, accounting, actuarial, consulting, data aggregation, management, accreditation, or financial services, where the performance of such services involves giving the service provider access to PHI;
  • Health information organizations;
  • E-prescribing gateways;
  • Other entities that provide data transmission services with respect to PHI to a covered entity and that requires routine access to PHI;
  • Entities that offer a personal health record to one or more individuals on behalf of a covered entity; and
  • Entities that maintain PHI, whether or not the entities actually review the PHI.

XI. Disclosures of De-Identified Information

The Business Associate may freely use and disclose de-identified information.  De-identified information is health information that does not identify an individual and with respect to which there is no reasonable basis to believe that the information can be used to identify an individual.  There are two ways a business associate can determine that information is de-identified: either by professional statistical analysis, or by removing specific identifiers.

XII. Physical Access Controls/Guidelines to Guard PHI

The Business Associate will maintain strict physical access controls to its information systems at all times and under all conditions.  This includes the physical security of electronic and paper data. 

The Business Associate will terminate access to information systems and other sources of PHI, including access to rooms or buildings where PHI is located, when an employee, agent or contractor ends his/her employment or engagement.  The Business Associate will terminate access to specific types of PHI when the status of any member of the workforce no longer requires access to those types of information. 

Cleaning personnel:

Cleaning personnel do not need PHI to accomplish their work.  Whenever reasonably possible, PHI will be placed in locked containers, cabinets or rooms before cleaning personnel enter an area.  When it is not reasonably possible to lock up PHI, it must be removed from sight before cleaning personnel enter an area and a supervisor must be present.

Computer Screens:

Computer screens at each workstation must be positioned so that only authorized users at that workstation can read the display.  When screens cannot be relocated, filters, hoods, or other devices may be employed.  Computer displays will be configured to go blank, or to display a screen saver, when left unattended for more than a brief period of time.  The period of time will be determined by the Compliance Official.  Wherever practicable, reverting from the screen saver to the display of data will require a password.  Computer screens left unattended for longer periods of time will log off the user.  The period of time will be determined by the Compliance Official.

Conversations:

Conversations concerning individual care or other PHI must be conducted in a way that reduces the likelihood of being overheard by others.  Wherever reasonably possible, barriers will be used to reduce the opportunity for conversations to be overheard.

Copying medical records and other PHI:

When PHI is copied, only the information that is necessary to accomplish the purpose for which the copy is being made, may be copied.  This may require that part of a page be masked.

Desks and countertops:

Provider reports and other documents which may display identifiers and other “keys” to information should be placed face down on counters, desks, and other places where individuals or visitors can see them.  Wherever it is reasonably possible to do so, medical reports and other documents containing PHI will not be left on desks and countertops after business hours.  Supervisors will take reasonable steps to provide all work areas where PHI is used in paper form with lockable storage bins, lockable desk drawers or other means to secure PHI during periods when the area is left unattended.  In areas where locked storage after hours cannot reasonably be accomplished, PHI must be kept out of sight.  A supervisor must be present whenever someone who is not authorized to have access to that data is in the area.

Disposal of paper with PHI:

Paper documents containing PHI must be shredded when no longer needed.  If retained for a commercial shredder, they must be kept in a locked bin.

Home office:

Any member of the workforce who is authorized to work from a home office must assure that the home office complies with all applicable policies and procedures regarding the security and privacy of PHI, including these guidelines.

Key policy:

The Compliance Official will develop a list of which personnel, by job title, may have access to which keys.  This includes keys to storage cabinets, storage rooms and buildings.  All keys must be signed out.  Keys must be surrendered upon termination of employment.  The Compliance Official will ensure that locks are changed whenever there is evidence that a key is no longer under the control of an authorized member of the workforce, and its loss presents a security threat that justifies the expense.

Phones and Laptops:

The privacy and security policies apply to any PHI that is stored on a phone or laptop.  Users of phone and laptops are responsible for assuring that the PHI on their devices is kept secure and private.  Any loss or theft of a phone or laptop thought to contain PHI must be reported to the Compliance Official immediately.  Users of phones who store PHI on their devices will receive special training in the risks of this practice, and measures that they can take to reduce the risks (such as use of passwords).

Printers and Fax Machines:

Printers and fax machines must be located in secure areas, where only authorized members of the workforce can have access to documents being printed. 

Records carried from one building to another: 

When PHI is carried from one building to another, it must be signed out and signed in.  When a member of the workforce is transporting PHI from one building to another, it may not be left unattended unless it is in a locked vehicle, in an opaque, locked container.  Locking the vehicle alone is not sufficient.

Record Storage:

Areas where records and other documents that contain PHI are stored must be secure.  Wherever reasonably possible, the PHI will be stored in locking cabinets.  Where locking cabinets are not available, the storage area must be locked when no member of the workforce is present to observe who enters and leaves and no unauthorized personnel may be left alone in such areas without supervision.

Workforce Vigilance:

All members of the workforce are responsible for watching for unauthorized use or disclosure of PHI, to act to prevent the action, and to report suspected breaches of privacy and security policies to their supervisor, or to the Compliance Official (example of a breach:  individual or visitor looking through PHI left on a counter). 

Visitors:

Visitors to areas where PHI is being used must be accompanied by a member of the Business Associate’s workforce.

XII. Breach Notification Requirements

The Business Associate will comply with the requirements of the HITECH Act and its implementing regulations to provide notification to affected covered entities and the media (when required) if they discover a breach of unsecured PHI.

Policies on Individual Rights

I. Access to Protected Health Information and Requests for Amendment

HIPAA gives participants of covered entities the right to access and obtain copies of their PHI (or electronic copies of PHI) that the covered entities (or the Business Associate) maintain in designated record sets.  HIPAA also provides that participants may request to have their PHI amended.  The Business Associate will provide access to PHI and it will consider requests for amendment that are submitted in writing by participants from the covered entities.

Designated Record Set is a group of records maintained by or for the covered entities, the sponsoring employers, or the Business Associate that includes:

  • The enrollment, payment, and claims adjudication record of an individual maintained by or for the covered entities; or
  • Other PHI used, in whole or in part, by or for the covered entities to make coverage decisions about an individual.

II. Accounting

An individual has the right to obtain an accounting of certain disclosures of his or her own PHI.  This right to an accounting extends to disclosures made in the last six years, other than disclosures:

  • To carry out treatment, payment or health care operations;
  • To individuals about their own PHI;
  • Incident to an otherwise permitted use or disclosure;
  • Pursuant to an authorization;
  • For purposes of creation of a facility directory or to persons involved in the patient’s care or other notification purposes;
  • As part of a limited data set;
  • For other national security or law enforcement purposes; or
  • Disclosures that occurred prior to the compliance date.

The covered entities shall respond to an accounting request within 60 days with cooperation of the Business Associate.  If the covered entities are unable to provide the accounting within 60 days, it may extend the period by 30 days, provided that it gives the participant notice (including the reason for the delay and the date the information will be provided) within the original 60-day period.

The accounting must include the date of the disclosure, the name of the receiving party, a brief description of the information disclosed, and a brief statement of the purpose of the disclosure (or a copy of the written request for disclosure, if any).

The first accounting in any 12-month period shall be provided free of charge.  The Compliance Official of the Business Associate may impose reasonable production and mailing costs for subsequent accountings from the covered entities.

III. Requests for Alternative Communication Means or Locations

Participants may request to receive communications regarding their PHI by alternative means or at alternative locations from the covered entities.  For example, participants may ask to be called only at work rather than at home.  Such requests may be honored if, in the sole discretion of the covered entities, the requests are reasonable.

However, a covered entity shall accommodate such a request if the participant clearly provides information that the disclosure of all or part of that information could endanger the participant.  The Compliance Official of the Business Associate has responsibility for administering requests for confidential communications from the covered entities.

IV. Requests for Restrictions on Uses and Disclosures of PHI

A participant may request restrictions on the use and disclosure of the participant’s PHI.  It is the covered entities’ policy to attempt to honor such requests if, in the sole discretion of the Employer, the requests are reasonable.  The covered entities are charged with responsibility for administering requests for restrictions and shall communicate any restrictions to the Compliance Official of the Business Associate.