Health Information Technology

Early Efforts Initiated but Comprehensive Privacy Approach Needed for National Strategy Gao ID: GAO-07-238 January 10, 2007

The expanding implementation of health information technology (IT) and electronic health information exchange networks raises concerns regarding the extent to which the privacy of individuals' electronic health information is protected. In April 2004, President Bush called for the Department of Health and Human Services (HHS) to develop and implement a strategic plan to guide the nationwide implementation of health IT. The plan is to recommend methods to ensure the privacy of electronic health information. GAO was asked to describe HHS's efforts to ensure privacy as part of its national strategy and to identify challenges associated with protecting electronic personal health information. To do this, GAO assessed relevant HHS privacy-related initiatives and analyzed information from health information organizations.

HHS and its Office of the National Coordinator for Health IT have initiated actions to identify solutions for protecting personal health information through several contracts and with two health information advisory committees. For example, in late 2005, HHS awarded several health IT contracts that include requirements for addressing the privacy of personal health information exchanged within a nationwide health information exchange network. Its privacy and security solutions contractor is to assess the organization-level privacy- and security-related policies, practices, laws, and regulations that affect interoperable health information exchange. Additionally, in June 2006, the National Committee on Vital and Health Statistics made recommendations to the Secretary of HHS on protecting the privacy of personal health information within a nationwide health information network, and in August 2006, the American Health Information Community convened a work group to address privacy and security policy issues for nationwide health information exchange. While these activities are intended to address aspects of key principles for protecting the privacy of health information, HHS is in the early stages of its efforts and has therefore not yet defined an overall approach for integrating its various privacy-related initiatives and addressing key privacy principles, nor has it defined milestones for integrating the results of these activities. GAO identified key challenges associated with protecting electronic personal health information in four areas.

Recommendations

Our recommendations from this work are listed below with a Contact for more information. Status will change from "In process" to "Open," "Closed - implemented," or "Closed - not implemented" based on our follow up work.

Director: Team: Phone:


GAO-07-238, Health Information Technology: Early Efforts Initiated but Comprehensive Privacy Approach Needed for National Strategy This is the accessible text file for GAO report number GAO-07-238 entitled 'Health Information Technology: Early Efforts Initiated but Comprehensive Privacy Approach Needed for National Strategy' which was released on February 1, 2007. This text file was formatted by the U.S. Government Accountability Office (GAO) to be accessible to users with visual impairments, as part of a longer term project to improve GAO products' accessibility. Every attempt has been made to maintain the structural and data integrity of the original printed product. Accessibility features, such as text descriptions of tables, consecutively numbered footnotes placed at the end of the file, and the text of agency comment letters, are provided but may not exactly duplicate the presentation or format of the printed version. The portable document format (PDF) file is an exact electronic replica of the printed version. We welcome your feedback. Please E-mail your comments regarding the contents or accessibility features of this document to Webmaster@gao.gov. This is a work of the U.S. government and is not subject to copyright protection in the United States. It may be reproduced and distributed in its entirety without further permission from GAO. Because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately. Report to Congressional Requesters: January 2007: Health Information Technology: Early Efforts Initiated but Comprehensive Privacy Approach Needed for National Strategy: GAO-07-238: GAO Highlights: Highlights of GAO-07-238, a report to congressional requesters Why GAO Did This Study: The expanding implementation of health information technology (IT) and electronic health information exchange networks raises concerns regarding the extent to which the privacy of individuals‘ electronic health information is protected. In April 2004, President Bush called for the Department of Health and Human Services (HHS) to develop and implement a strategic plan to guide the nationwide implementation of health IT. The plan is to recommend methods to ensure the privacy of electronic health information. GAO was asked to describe HHS‘s efforts to ensure privacy as part of its national strategy and to identify challenges associated with protecting electronic personal health information. To do this, GAO assessed relevant HHS privacy-related initiatives and analyzed information from health information organizations. What GAO Found: HHS and its Office of the National Coordinator for Health IT have initiated actions to identify solutions for protecting personal health information through several contracts and with two health information advisory committees. For example, in late 2005, HHS awarded several health IT contracts that include requirements for addressing the privacy of personal health information exchanged within a nationwide health information exchange network. Its privacy and security solutions contractor is to assess the organization-level privacy- and security- related policies, practices, laws, and regulations that affect interoperable health information exchange. Additionally, in June 2006, the National Committee on Vital and Health Statistics made recommendations to the Secretary of HHS on protecting the privacy of personal health information within a nationwide health information network, and in August 2006, the American Health Information Community convened a work group to address privacy and security policy issues for nationwide health information exchange. While these activities are intended to address aspects of key principles for protecting the privacy of health information, HHS is in the early stages of its efforts and has therefore not yet defined an overall approach for integrating its various privacy-related initiatives and addressing key privacy principles, nor has it defined milestones for integrating the results of these activities. GAO identified key challenges associated with protecting electronic personal health information in four areas (see table). Table: Challenges to Exchanging Electronic Health Information: Area: Understanding and resolving legal and policy issues; * Resolving uncertainties regarding varying the extent of federal privacy protection required of various organizations; * Understanding and resolving data-sharing issues introduced by varying state privacy laws and organization-level practices; * Reaching agreement on organizations' differing interpretations and applications of HIPAA privacy and security rules; * Determining liability and enforcing sanctions in cases of breach of confidentiality. Area: Ensuring appropriate disclosure; * Determining the minimum data necessary that can be disclosed in order for requesters to accomplish their intended purposes; * Obtaining individuals' authorization and consent for use and disclosure of personal health information; * Determining the best way to allow individuals to participate in and consent to electronic health information exchange; * Educating consumers so that they understand the extent to which their consent to use and disclose health information applies. Area: Ensuring individuals' rights to request access and amendments to health information to ensure it is correct; * Ensuring that individuals understand that they have rights to request access and amendments to their own health information to ensure that it is correct; * Ensuring that individuals' amendments are properly made and tracked across multiple locations. Area: Implementing adequate security measures for protecting health information; * Determining and implementing adequate techniques for authenticating requesters of health information; * Implementing proper access controls and maintaining adequate audit trails for monitoring access to health data; * Protecting data stored on portable devices and transmitted between business partners. Source: GAO analysis of information provided by state-level health information exchange organizations, federal health care providers, and health IT professional associations. [End of table] What GAO Recommends: GAO recommends that HHS define and implement an overall privacy approach that identifies milestones for integrating the outcomes of its initiatives, ensures that key privacy principles are fully addressed, and addresses challenges associated with the nationwide exchange of health information. In its comments, HHS disagreed and stated that it has established a comprehensive privacy approach. However, GAO believes that an overall approach for integrating HHS‘s initiatives has not been fully defined and implemented. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-07-238. To view the full product, including the scope and methodology, click on the link above. For more information, contact Linda D. Koontz, (202) 512-6240 or koontzl@gao.gov. [End of Section] Contents: Letter: Results in Brief: Background: Federal Government's Role in Health Care: HHS Has Initiated Actions to Identify Solutions for Protecting Personal Health Information but Has Not Defined an Overall Approach for Addressing Privacy: The Health Care Industry Faces Challenges in Protecting Electronic Health Information: Conclusions: Recommendation for Executive Action: Agency Comments and Our Evaluation: Appendixes: Appendix I: Objectives, Scope, and Methodology: Appendix II: Major Federal Health Care Programs: Appendix III: HHS Health IT Contracts: Appendix IV: The Office of the National Coordinator for Health IT's Goals, Objectives, and Strategies: Appendix V: Descriptions of Federal Laws for Protecting Personal Health Information: Appendix VI: Comments from the Department of Health and Human Services: Appendix VII: Comments from the Department of Veterans Affairs: Appendix VIII: GAO Contacts and Acknowledgments: Tables Tables: Table 1: Key Privacy Principles in HIPAA's Privacy Rule: Table 2: Key HIPAA Privacy Principles and HHS's Initiatives Intended to Address Aspects of the Principles: Table 3: Challenges to Exchanging Electronic Health Information: Table 4: Federal Programs: Table 5: HHS Health IT Contracts: Table 6: Goals, Objectives, and Strategies of the Office of the National Coordinator: Table 7: Selected Federal Laws that Protect Personal Health Information: Abbreviations: AHIC: American Health Information Community: DOD: Department of Defense: Health IT: health information technology: HIPAA: Health Insurance Portability and Accountability Act of 1996: HHS: Health and Human Services: NCVHS: National Committee on Vital and Health Statistics: NHIN: Nationwide Health Information Network: VA: Department of Veterans Affairs: January 10, 2007: The Honorable Daniel K. Akaka: Chairman: Subcommittee on Oversight of Government Management, the Federal Workforce, and the District of Columbia: Committee on Homeland Security and Governmental Affairs: U.S. Senate: The Honorable Edward M. Kennedy: Chairman: Committee on Health, Education, Labor and Pensions: U.S. Senate: The expanding implementation of health information technology (health IT)[Footnote 1] and electronic health care information exchange networks raises concerns regarding the extent to which individuals' privacy is protected. Inappropriate disclosure of personal health information[Footnote 2] could result in information being revealed that individuals wish to keep confidential. Recent incidents in which unauthorized persons accessed data and where employees' laptops containing personal information were stolen highlight the vulnerability of electronic personal information and the reservations the public has about sharing personal health information electronically. Key privacy principles for protecting personal information have been in existence for years and provide a foundation for privacy laws, practices, and policies. Those privacy principles are reflected in the provisions of the Health Insurance Portability and Accountability Act of 1996 (HIPAA), which define the circumstances under which an individual's health information may be used or disclosed. In addition, HIPAA's security provisions require entities that hold or transmit personal health information to maintain reasonable safeguards to protect it against unauthorized use or disclosure and ensure its integrity and confidentiality. In April 2004, President Bush issued an executive order that called for the development and implementation of a strategic plan to guide the nationwide implementation of interoperable health IT in both the public and private sectors.[Footnote 3] The plan is to address privacy and security issues related to interoperable health IT and recommend methods to ensure appropriate authorization, authentication, and encryption of data for transmission over the Internet. The order established the position of the National Coordinator for Health Information Technology within the Department of Health and Human Services (HHS) as the government official responsible for developing and implementing a strategic plan for health IT. You asked us to describe HHS's efforts to help ensure the privacy of health information. Specifically, our objectives were to: * describe the steps HHS is taking to ensure privacy protection as part of the national health IT strategy and: * identify challenges associated with meeting requirements for protecting personal health information within a nationwide health information network. To address our first objective, we focused our analytical work on HHS because it is responsible for development and implementation of a national health information technology strategy that is to include the protection of personal health information. We evaluated information from and held discussions with officials from HHS components and advisory committees that play major roles in supporting HHS's efforts to ensure the protection of electronic health information exchanged within a nationwide health information network. To address the second objective, we reviewed and analyzed information obtained from documentation provided by and discussions held with officials from federal agencies that provide health care services--the Centers for Medicare and Medicaid Services, the Departments of Defense and Veterans Affairs, and the Indian Health Service--and representatives from selected state-level health information exchange organizations. We selected organizations that are currently exchanging electronic health information to obtain examples of challenges they face in protecting health information as they implement electronic health information exchange systems. We analyzed the information they provided to identify key challenges faced throughout the health care industry as the implementation of electronic health information exchange expands. Further details about our objectives, scope, and methodology are provided in appendix I. We performed our work from December 2005 through November 2006 in accordance with generally accepted government auditing standards. Results in Brief: HHS and its Office of the National Coordinator for Health IT have initiated actions to study the protection of personal health information through the work of several contracts, the National Committee on Vital and Health Statistics,[Footnote 4] and the American Health Information Community.[Footnote 5] For example: * In late 2005, HHS awarded several health IT contracts that include requirements for addressing the privacy of personal health information exchanged within an electronic nationwide health information network. * In summer 2006, HHS's contractor for privacy and security solutions selected 33 states and Puerto Rico as locations in which to perform assessments of organization-level privacy-and security-related policies, practices, laws, and regulations that affect interoperable health information exchange and to propose privacy and security protections that permit interoperability. * In June 2006, the National Committee on Vital and Health Statistics provided a report to the Secretary of HHS that made recommendations on protecting the privacy of personal health information within a nationwide health information network. * In August 2006, the American Health Information Community also convened a work group to address privacy and security policy issues for nationwide health information exchange. HHS and its Office of the National Coordinator for Health IT intend to use the results of these activities to identify technology and policy solutions for protecting personal health information as part of their continuing efforts to complete a national strategy to guide the nationwide implementation of health IT. While these activities are intended to address aspects of key principles for protecting health information, HHS is in the early stages of its efforts and has therefore not yet defined an overall approach for integrating its various privacy-related initiatives and addressing key privacy principles. In addition, milestones for integrating the results of these activities do not yet exist. Until HHS defines an integration approach and milestones for completing these steps, its overall approach for ensuring the privacy and protection of personal health information exchanged throughout a nationwide network will remain unclear. Key challenges associated with protecting personal health information are understanding and resolving legal and policy issues, such as those related to variations in states' privacy laws; ensuring that only the minimum amount of information necessary is disclosed to only those entities authorized to receive the information; ensuring individuals' rights to request access and amendments to their own health information; and implementing adequate security measures for protecting health information. We are recommending that the Secretary of HHS define and implement an overall approach for protecting health information as part of the strategic plan called for by the President. This approach should (1) identify milestones for integrating the outcomes of HHS's privacy- related initiatives, (2) ensure that key privacy principles are fully addressed, and (3) address key challenges associated with the nationwide exchange of health information. We received written comments on a draft of this report from HHS's Assistant Secretary for Legislation. The Assistant Secretary disagreed with our recommendation. Throughout the comments, the Assistant Secretary referred to the department's comprehensive and integrated approach for ensuring the privacy and security of health information within nationwide health information exchange. However, an overall approach for integrating the department's various privacy-related initiatives has not been fully defined and implemented. We acknowledge in our report that HHS has established a strategic objective to protect consumer privacy along with two specific strategies for meeting this objective. Our report also acknowledges the key efforts that HHS has initiated to address this objective, and HHS's comments describe these and additional state and federal efforts. HHS stated that the department has made significant progress in integrating these efforts. While progress has been made initiating these efforts, much work remains before they are completed and the outcomes of the various efforts are integrated. Thus, we recommended that HHS define and implement a comprehensive privacy approach that includes milestones for integration, identifies the entity responsible for integrating the outcomes of its privacy-related initiatives, addresses key privacy principles, and ensures that challenges are addressed in order to meet the department's objective to protect the privacy of health information exchanged within a nationwide health information network. HHS specifically disagreed with the need to identify milestones and stated that tightly scripted milestones would impede HHS's processes and preclude stakeholder dialogue on the direction of important policy matters. We disagree and believe that milestones are important for setting targets for implementation and informing stakeholders of HHS's plans and goals for protecting personal health information as part of its efforts to achieve nationwide implementation of health IT. Milestones are especially important considering the need for HHS to integrate and coordinate the many deliverables of its numerous ongoing and remaining activities. We agree that it is important for HHS to continue to actively involve both public and private sector health care stakeholders in its processes. HHS did not comment on the need to identify an entity responsible for the integration of the department's privacy-related initiatives, nor did it provide information regarding any effort to assign responsibility for this important activity. HHS neither agreed nor disagreed that its approach should address privacy principles and challenges, but stated that the department plans to continue to work toward addressing privacy principles in HIPAA and that our report appropriately highlights efforts to address challenges encountered during electronic health information exchange. In his written comments, The Secretary of Veterans Affairs (VA) concurred with our findings, conclusions, and recommendations to the Secretary of HHS and commended our efforts to highlight methods for ensuring the privacy of electronic health information. Both agencies provided technical comments, which we have incorporated into the report as appropriate. Written comments from HHS and VA are reproduced in appendixes VI and VII. The Department of Defense (DOD) chose not to comment on a draft of this report. Background: Studies published by the Institute of Medicine and other organizations have indicated that fragmented, disorganized, and inaccessible clinical information adversely affects the quality of health care and compromises patient safety. In addition, long-standing problems with medical errors and inefficiencies increase costs for health care delivery in the United States. With health care spending in 2004 reaching almost $1.9 trillion, or 16 percent, of the gross domestic product, concerns about the costs of health care continue. As we reported last year, many policy makers, industry experts, and medical practitioners contend that the U.S. health care system is in a crisis.[Footnote 6] Health IT provides a promising solution to help improve patient safety and reduce inefficiencies. The expanded use of health IT has great potential to improve the quality of care, bolster the preparedness of our public health infrastructure, and save money on administrative costs. As we reported in 2003, technologies such as electronic health records and bar coding of certain human drug and biological product labels have been shown to save money and reduce medical errors.[Footnote 7] Health care organizations reported that IT contributed other benefits, such as shorter hospital stays, faster communication of test results, improved management of chronic diseases, and improved accuracy in capturing charges associated with diagnostic and procedure codes. Over the past several years, a growing number of communities have established health information exchange organizations that allow multiple health care providers, such as physicians, clinical laboratories, and emergency rooms to share patients' electronic health information. Most of these organizations are in either the planning or early implementation phases of establishing electronic health information exchange. Federal Government's Role in Health Care: According to the Institute of Medicine, the federal government has a central role in shaping nearly all aspects of the health care industry as a regulator, purchaser, health care provider, and sponsor of research, education, and training. Seven major federal health care programs, such as the Centers for Medicare and Medicaid Services (CMS), DOD's TRICARE, VA's Veterans Health Administration, and HHS's Indian Health Service, provide or fund health care services to approximately 115 million Americans. According to HHS, federal agencies fund more than a third of the nation's total health care costs. Given the level of the federal government's participation in providing health care, it has been urged to take a leadership role in driving change to improve the quality and effectiveness of medical care in the United States, including expanded adoption of IT. The programs and number of citizens who receive health care services from the federal government and the cost of these services are summarized in appendix II. In April 2004, President Bush called for the widespread adoption of interoperable electronic health records within 10 years and issued an executive order that established the position of the National Coordinator for Health Information Technology within HHS as the government official responsible for the development and execution of a strategic plan to guide the nationwide implementation of interoperable health IT in both the public and private sectors.[Footnote 8] In July 2004, HHS released The Decade of Health Information Technology: Delivering Consumer-centric and Information-rich Health Care-- Framework for Strategic Action.[Footnote 9] This framework described goals for achieving nationwide interoperability of health IT and actions to be taken by both the public and private sectors in implementing a strategy. HHS's Office of the National Coordinator for Health IT updated the framework's goals in June 2006 and included an objective for protecting consumer privacy. It identified two specific strategies for meeting this objective--(1) support the development and implementation of appropriate privacy and security policies, practices, and standards for electronic health information exchange and (2) develop and support policies to protect against discrimination based on personal health information such as denial of medical insurance or employment. Need for a National Strategy and Adoption of Interoperable Health IT: In July 2004, we testified on the benefits that effective implementation of IT can bring to the health care industry and the need for HHS to provide continued leadership, clear direction, and mechanisms to monitor progress in order to bring about measurable improvements.[Footnote 10] Since then, we have reported or testified on several occasions on HHS's efforts to define its national strategy for health IT. We recommended that HHS develop the detailed plans and milestones needed to ensure that its goals are met, and HHS agreed with our recommendation.[Footnote 11] In our report and testimonies, we have described a number of actions that HHS, through the Office of the National Coordinator for Health IT, has taken toward accelerating the use of IT to transform the health care industry,[Footnote 12] including the development of the framework for strategic action. We described the formation of a public-private advisory body--the American Health Information Community--to advise HHS on achieving interoperability for health information exchange and four breakthrough areas[Footnote 13] the community identified--consumer empowerment, chronic care, biosurveillance, and electronic health records. Additionally, we reported that, in late 2005, HHS's Office of the National Coordinator for Health IT awarded $42 million in contracts to address a range of issues important for developing a robust health IT infrastructure. In October 2006, HHS's Office of the National Coordinator for Health IT awarded an additional contract to form a state-level electronic health alliance and address challenges to health information exchange, including privacy and security issues. HHS intends to use the results of the contracts and recommendations from the National Committee on Vital and Health Statistics and the American Health Information Community proceedings to define the future direction of a national strategy. The contracts are described in appendix III. We have also described the Office of the National Coordinator's continuing efforts to work with other federal agencies to revise and refine the goals and strategies identified in its initial framework. The current draft framework--The Office of the National Coordinator: Goals, Objectives, and Strategies--identifies objectives for accomplishing each of four goals, along with 32 high-level strategies for meeting the objectives. It includes a specific objective for safeguarding consumer privacy and protecting against risks along with two strategies for meeting this objective: (1) support the development and implementation of appropriate privacy and security policies, practices, and standards for electronic health information exchange and (2) develop and support policies to protect against discrimination based on personal health information, such as denial of medical insurance or employment. According to officials with the Office of the National Coordinator, the framework will continue to evolve as the office works with other federal agencies to further refine its goals, objectives, and strategies, which are described in appendix IV. While HHS continues to refine the goals and strategies of its framework for a national health IT strategy, it has not yet defined the detailed plans and milestones needed to ensure that its goals are met, as we previously recommended. Legal Privacy Protections for Personal Health Information: As the use of electronic health information exchange increases, so does the need to protect personal health information from inappropriate disclosure. The capacity of health information exchange organizations to store and manage a large amount of electronic health information increases the risk that a breach in security could expose the personal health information of numerous individuals. According to results of a study conducted for AARP[Footnote 14] in February 2006, Americans are concerned about the risks introduced by the use of electronic health information systems but also support the creation of a nationwide health information network. A 2005 Harris survey showed that 70 percent of Americans are concerned that an electronic medical record system could lead to sensitive medical information being exposed because of weak security, and 69 percent are concerned that such a system would lead to more personal health information being shared without patients' knowledge.[Footnote 15] While information technology can provide the means to protect the privacy of electronically stored and exchanged health information, the increased risk of inappropriate access and disclosure raises the level of importance for adequate privacy protections and security mechanisms to be implemented in health information exchange systems. Early Federal Laws Enacted to Protect the Privacy of Health Information: A number of federal statutes were enacted between 1970 and the early 1990s to protect individual privacy. For the most part, the inclusion of medical records in these laws was incidental to a more general purpose of protecting individual privacy in certain specified contexts. For example, the Privacy Act of 1974 was enacted to regulate the collection, maintenance, use, and dissemination of personal information by federal government agencies. It prohibits disclosure of records held by a federal agency or its contractors in a system of records[Footnote 16] without the consent or request of the individual to whom the information pertains unless the disclosure is permitted by the Privacy Act or its regulations. The Privacy Act specifically includes medical history in its definition of a record. Likewise, the Social Security Act requires the Secretary of HHS to protect beneficiaries' records and information transmitted to or obtained by or from HHS or the Social Security Administration. Descriptions of these and other federal laws that protect health information are provided in appendix V. Health Insurance Portability and Accountability Act of 1996: Federal health care reform initiatives of the early-to mid-1990s were, in part, inspired by public concern about the privacy of personal medical information as the use of health IT increased. Congress, recognizing that benefits and efficiencies could be gained by the use of information technology in health care, also recognized the need for comprehensive federal medical privacy protections and consequently passed the Health Insurance Portability and Accountability Act of 1996. This law provided for the Secretary of HHS to establish the first broadly applicable federal privacy and security protections designed to protect individual health care information. HIPAA provides for the protection of certain health information held by covered entities, defined under regulations implementing HIPAA as health plans that provide or pay for the medical care of individuals, health care providers that electronically transmit health information in connection with any of the specific transactions regulated by the statute, and health care clearinghouses that receive health information from other entities and process or facilitate the processing of that information into standard or nonstandard format for those entities.[Footnote 17] HIPAA requires the Secretary of HHS to promulgate regulatory standards to protect the privacy of certain personal health information.[Footnote 18] "Health information" is defined by the statute as any information in any medium that is created or received by a health care provider, health plan, public health authority, employer, life insurer, school or university, or health care clearinghouse and relates to the past, present, or future physical or mental health condition of an individual, provision of health care of an individual, or payment for the provision of health care of an individual. HIPAA also requires the Secretary of HHS to adopt security standards for covered entities that maintain or transmit health information to maintain reasonable and appropriate safeguards. The law requires that covered entities take certain measures to ensure the confidentiality and integrity of the information and to protect it against reasonably anticipated unauthorized use or disclosure and threats or hazards to its security. HIPAA provides authority to the Secretary to enforce these standards. The Secretary has delegated administration and enforcement of privacy standards to the department's Office for Civil Rights and enforcement of the security standards to the department's Centers for Medicare and Medicaid Services. Finally, most, if not all, states have statutes that in varying degrees protect the privacy of personal health information. HIPAA recognizes this and specifically provides that regulations implementing HIPAA do not preempt contrary provisions of state law if the state laws impose more stringent requirements, standards, or specifications than the federal privacy rule. In this way, HIPAA and its implementing rules establish a baseline of mandatory minimum privacy protections and define basic principles for protecting personal health information. The Secretary of HHS first issued HIPAA's Privacy Rule in December 2000, following public notice and comment, but later modified the rule in August 2002. The Privacy Rule governs the use and disclosure of protected health information, which is generally defined as individually identifiable health information that is held or transmitted in any form or medium by a covered entity. The Privacy Rule regulates covered entities' use and disclosure of protected health information. In general, a covered entity may not use or disclose an individual's protected health information without the individual's authorization. However, uses and disclosures without an individual's authorization are permitted in specified situations, such as for treatment, payment, and health care operations and public health purposes. In addition, the Privacy Rule requires that a covered entity make reasonable efforts to use, disclose, or request only the minimum necessary protected health information to accomplish the intended purpose, with certain exceptions such as for disclosures for treatment and uses and disclosures required by law. Most covered entities must provide notice of their privacy practices. Such notice is required to contain specific elements that are set out in the regulations. Those elements include (1) a description of the uses and disclosures of protected health information the covered entity may make; (2) a statement of the covered entity's duty with regard to the information, including protecting the individual's privacy; (3) the individual's rights with respect to the information, including, for example, the right to complain to HHS if he or she believes the information has been handled in violation of the law; and (4) a contact from whom individuals may obtain further information about the covered entity's privacy policies. A covered entity is also required to account for certain disclosures of an individual's protected health information and to provide such an accounting to those individuals on request. In general, a covered entity must account for disclosures of protected health information made for purposes other than for treatment, payment, and health care operations, such as for public health or law enforcement purposes. HIPAA's Privacy Rule reflects basic privacy principles for ensuring the protection of personal health information. Table 1 summarizes these principles. Table 1: Key Privacy Principles in HIPAA's Privacy Rule: HIPAA Privacy Rule principle: Uses and disclosures; Provides limits to the circumstances in which an individual's protected health information may be used or disclosed by covered entities and provides for accounting of certain disclosures; requires covered entities to make reasonable efforts to disclose or use only the minimum necessary information to accomplish the intended purpose for the uses, disclosures, or requests, with certain exceptions such as for treatment or as required by law. HIPAA Privacy Rule principle: Notice; Requires most covered entities to provide a notice of their privacy practices including how personal health information may be used and disclosed. HIPAA Privacy Rule principle: Access; Establishes individuals' right to review and obtain a copy of their protected health information held in a designated record set.[A]. HIPAA Privacy Rule principle: Security[B]; Requires covered entities to safeguard protected health information from inappropriate use or disclosure. HIPAA Privacy Rule principle: Amendments; Gives individuals the right to request from covered entities changes to inaccurate or incomplete protected health information held in a designated record set.[A]. HIPAA Privacy Rule principle: Administrative requirements; Requires covered entities to analyze their own needs and implement solutions appropriate for their own environment based on a basic set of requirements for which they are accountable. HIPAA Privacy Rule principle: Authorization; Requires covered entities to obtain the individual's written authorization or consent for uses and disclosures of personal health information with certain exceptions, such as for treatment, payment, and health care operations, or as required by law. Covered entities may choose to obtain the individual's consent to use or disclose protected health information to carry out treatment, payment, or health care operations but are not required to do so. Source: GAO analysis of HIPAA Privacy Rule. [A] According to the HIPAA Privacy Rule, a designated record set is a group of records maintained by or for a covered entity that are (1) the medical records and billing records about individuals maintained by or for a covered health care provider; (2) the enrollment, payment, claims adjudication, and case or medical management record systems maintained by or for a health plan; or (3) used, in whole or in part, by or for the covered entity to make decisions about individuals. [B] The HIPAA Security Rule further defines safeguards that covered entities must implement to provide assurance that health information is protected from inappropriate uses and disclosure. [End of table] Subsequent to the issuance of the Privacy Rule, the Secretary issued the HIPAA Security Rule in February 2003 to safeguard electronic protected health information and help ensure that covered entities have proper security controls in place to provide assurance that the information is protected from unwarranted or unintentional disclosure. The Security Rule includes administrative, physical, and technical safeguards and specific implementation instructions, some of which are required and, therefore, must be implemented by covered entities. Other implementation specifications are "addressable" and under certain conditions permit covered entities to use reasonable and appropriate alternative steps. Covered entities are required to develop policies and procedures for both required and addressable specifications. The privacy and security rules require covered entities to include provisions in contracts with business associates that mandate that business associates implement appropriate privacy and security protections. A business associate is any person or entity that performs on behalf of a covered entity any function or activity involving the use or disclosure of protected health information. The rules require covered entities to obtain through formal agreement satisfactory assurances that their business associates will appropriately safeguard protected health information. The Security Rule also contains specific requirements for business associate contracts and requires that covered entities maintain compliance policies and procedures in written form. However, covered entities are generally not liable for privacy violations of their business associates, and the Secretary of HHS does not have direct enforcement authority over business associates. HHS Has Initiated Actions to Identify Solutions for Protecting Personal Health Information but Has Not Defined an Overall Approach for Addressing Privacy: HHS and its Office of the National Coordinator for Health IT have initiated actions to identify solutions for protecting health information. Specifically, HHS awarded several health IT contracts that include requirements for developing solutions that comply with federal privacy and security requirements, consulted with the National Committee on Vital and Health Statistics (NCVHS) to develop recommendations regarding privacy and confidentiality in the Nationwide Health Information Network, and formed the American Health Information Community (AHIC) Confidentiality, Privacy, and Security Workgroup to frame privacy and security policy issues and identify viable options or processes to address these issues. The Office of the National Coordinator for Health IT intends to use the results of these activities to identify technology and policy solutions for protecting personal health information as part of its continuing efforts to complete a national strategy to guide the nationwide implementation of health IT. However, HHS is in the early stages of identifying solutions for protecting personal health information and has not yet defined an overall approach for integrating its various privacy-related initiatives and for addressing key privacy principles. HHS's Contracts Are to Address Privacy and Security Policy and Standards for Nationwide Health Information Exchange: HHS awarded four major health IT contracts in 2005 intended to advance the nationwide exchange of health information--Privacy and Security Solutions for Interoperable Health Information Exchange, Standards Harmonization Process for Health IT, Nationwide Health Information Network Prototypes, and Compliance Certification Process for Health IT. These contracts include requirements for developing solutions that comply with federal privacy requirements and identify techniques and standards for securing health information. HHS's contract for privacy and security solutions is intended to provide a nationwide synthesis of information to inform privacy and security policymaking at federal, state, and local levels. In summer 2006, the privacy and security solutions contractor selected 33 states and Puerto Rico as locations in which to perform assessments of organization-level privacy-and security-related policies and practices that affect interoperable electronic health information exchange and their bases, including laws and regulations. The contractor is supporting states and territories as they (1) assess variations in organization-level business policies and state laws that affect health information exchange, (2) identify and propose solutions while preserving the privacy and security requirements of applicable federal and state laws, and (3) develop detailed plans to implement solutions. The contractor is to develop a nationwide report that synthesizes and summarizes the variations identified, the proposed solutions, and the steps that states and territories are taking to implement their solutions. It is also to deliver an interim report to address policies and practices followed in nine domains of interest: (1) user and entity authentication, (2) authorization and access controls, (3) patient and provider identification to match identities, (4) information transmission security or exchange protocols (encryption, etc.), (5) information protections to prevent improper modification of records, (6) information audits that record and monitor the activity of health information systems, (7) administrative or physical security safeguards required to implement a comprehensive security platform for health IT, (8) state law restrictions about information types and classes and the solutions by which electronic personal health information can be viewed and exchanged, and (9) information use and disclosure policies that arise as health care entities share clinical health information electronically. These domains of interest address privacy principles for use and disclosure and security. The standards harmonization contract is intended to identify, among other things, security mechanisms that affect consumers' ability to establish and manage permissions and access rights, along with consent for authorized and secure exchange, viewing, and querying of their medical information between designated caregivers and other health professionals. In May 2006, the contractor for HHS's standards harmonization contract selected initial standards that are intended to provide security mechanisms. The initial security standards were made available for stakeholder and public comment in August and September, and the contractor's panel voted on final standards that were presented to AHIC in October 2006. AHIC accepted the panel's report and forwarded it to the Secretary for approval. HHS's Nationwide Health Information Network contract requires four selected contractors to develop proposals for a nationwide health information architecture and prototypes of a nationwide health information network. The prototypes are to address privacy and security solutions, such as user authentication and access control, for interoperable health information exchange. In June 2006, HHS held its first nationwide health information network forum, at which more than 1,000 functional requirements were proposed, including nearly 180 security requirements for ensuring the privacy and confidentiality of health information exchanged within a nationwide network. The proposed functional requirements were analyzed and refined by NCVHS, and on October 30, 2006, the committee approved a draft of minimum functional requirements for the Nationwide Health Information Network, and sent it to HHS for approval. In January 2007, the four contractors are to deliver and demonstrate functional prototypes that are deployed within and across three or more health care markets and operated with live health care data using the same technology for information exchange in all three markets. HHS's Compliance Certification Process for Health IT contract is intended to identify certification criteria for electronic health records, including security criteria. In May 2006, the Certification Commission for Health IT, which was awarded the contract, finalized initial certification criteria for ambulatory electronic health records[Footnote 19] including 32 security criteria that address components of the security principle, such as controls for limiting access to personal health information, methods for authenticating users before granting access to information, and requirements for auditing access to patients' health records. To date, 35 electronic health records products have been certified based on these criteria. The commission is currently defining its next phase of certification criteria for inpatient electronic health records. The National Committee on Vital and Health Statistics Made Recommendations for Addressing Privacy and Security within a Nationwide Health Information Network: In June 2006, NCVHS, a key national health information advisory committee, presented to the Secretary of HHS a report recommending actions regarding privacy and confidentiality in the Nationwide Health Information Network. The recommendations cover topics that are, according to the committee, central to challenges for protecting health information privacy in a national health information exchange environment. The recommendations address aspects of key privacy principles including (1) the role of individuals in making decisions about the use of their personal health information, (2) policies for controlling disclosures across a nationwide health information network, (3) regulatory issues such as jurisdiction and enforcement, (4) use of information by non-health care entities, and (5) establishing and maintaining the public trust that is needed to ensure the success of a nationwide health information network. The recommendations are being evaluated by the AHIC work groups, the Certification Commission for Health IT, Health Information Technology Standards Panel, and other HHS partners. In October 2006, the committee recommended to the Secretary of HHS that HIPAA privacy rules be extended to include other forms of health information not managed by covered entities. It also called on HHS to create policies and procedures to accurately match patients with their health records and to require functionality that allows patient or physician privacy preferences to follow records regardless of location. The committee intends to continue to update and refine its recommendations as the architecture and requirements of the network advance. The American Health Information Community's Confidentiality, Privacy, and Security Workgroup Is to Develop Recommendations to Establish a Privacy Policy Framework: AHIC, a committee that provides input and recommendations to HHS on nationwide health IT, formed the Confidentiality, Privacy, and Security Workgroup in July 2006 to frame the privacy and security policy issues relevant to all breakthrough areas and to solicit broad public input to identify viable options or processes to address these issues.[Footnote 20] The recommendations to be developed by this work group are intended to establish an initial policy framework and address issues including methods of patient identification, methods of authentication, mechanisms to ensure data integrity, methods for controlling access to personal health information, policies for breaches of personal health information confidentiality, guidelines and processes to determine appropriate secondary uses of data, and a scope of work for a long-term independent advisory body on privacy and security policies. The work group has defined two initial work areas--identity proofing[Footnote 21] and user authentication[Footnote 22]--as initial steps necessary to protect confidentiality and security. These two work areas address the security privacy principle. According to the cochairs of the work group, the members are developing work plans for completing tasks, including the definition of privacy and security policies for all of AHIC's breakthrough areas. The work group intends to address other key principles, including, but not limited to, maintaining data integrity and control of access. It plans to address policies for breaches of confidentiality and guidelines and processes for determining appropriate secondary uses of health information, an aspect of the use and disclosure privacy principle. HHS's Collective Initiatives Are Intended to Address Aspects of Key Privacy Principles, but an Overall Approach for Addressing Privacy Has Not Been Defined: HHS has taken steps intended to address aspects of key privacy principles through its contracts and with advice and recommendations from its two key health IT advisory committees. Table 2 describes HHS's current privacy-related initiatives and the key HIPAA privacy principles that they are intended to address. Table 2: Key HIPAA Privacy Principles and HHS's Initiatives Intended to Address Aspects of the Principles: Principle: Uses and disclosures: provides limits to the circumstances in which an individual's protected heath information may be used or disclosed by covered entities and provides for accounting of certain disclosures; requires covered entities to make reasonable efforts to disclose or use only the minimum necessary information to accomplish the intended purpose for the uses, disclosures, or requests, with certain exceptions such as for treatment or as required by law; HHS's initiative: * HHS's privacy and security solutions contractor is to provide a nationwide summary of statewide assessments of organization- level privacy-and security-related policies and practices that affect interoperable electronic health information exchange, along with proposed solutions and implementation plans. It is also to provide examples of potential areas for additional guidance under HIPAA; * Initial work of the AHIC privacy subgroup is to include work on guidelines and processes to determine appropriate secondary uses of data; * NCVHS recommended that individuals be given the right to decide whether they want to have personally identifiable electronic health records accessible via the Nationwide Health Information Network (NHIN), that disclosures be made based on role-based and contextual access criteria, and that HHS support efforts to convene a diversity of interested parties to design, define, and develop role-based and contextual access criteria appropriate for the network. Principle: Notice: requires most covered entities to provide a notice of their privacy practices including how personal health information may be used and disclosed; HHS's initiative: * HHS's privacy and security solutions contractor is to provide a nationwide summary of statewide assessments of organization-level privacy-and security- related policies and practices that affect interoperable electronic health information exchange, along with proposed solutions and implementation plans. It is also to provide examples of potential areas for additional guidance under HIPAA; * NCVHS recommended that HHS require that individuals be provided with information and education to ensure that they realize the implications of their decisions as to whether to participate in the NHIN. Principle: Access: establishes individuals' rights to review and obtain a copy of their protected health information held in a designated record set; HHS's initiative: * HHS's privacy and security solutions contractor is to provide a nationwide summary of statewide assessments of organization-level privacy-and security-related policies and practices that affect interoperable electronic health information exchange, along with proposed solutions and implementation plans. It is also to provide examples of potential areas for additional guidance under HIPAA. Principle: Security: requires covered entities to safeguard protected health information from inappropriate use or disclosure; HHS's initiative: * HHS's NHIN contractors proposed functional requirements including nearly 180 security requirements for the NHIN prototypes; * HHS's standards harmonization contractor selected 30 information exchange standards, including 13 related to consumer empowerment; * The electronic health record certification contractor defined 32 security criteria for certifying ambulatory electronic health record products; * HHS's privacy and security solutions contractor is to provide a nationwide summary of statewide assessments of organization- level privacy-and security-related policies and practices that affect interoperable electronic health information exchange, along with proposed solutions and implementation plans. It is also to provide examples of potential areas for additional guidance under HIPAA. It is also to address nine domains of information security; * NCVHS recommended that HHS support the research and technology needed to develop contextual access criteria appropriate for application to electronic health records and inclusion in the architecture of the NHIN; * The AHIC Confidentiality, Privacy, and Security Workgroup defined two initial work areas--identity proofing and user authentication--as the initial steps necessary to protect confidentiality and security. Principle: Amendments: gives individuals the right to request from covered entities changes to inaccurate or incomplete protected health information held in a designated record set; HHS's initiative: * HHS's privacy and security solutions contractor is to provide a nationwide summary of statewide assessments of organization-level privacy-and security-related policies and practices that affect interoperable electronic health information exchange, along with proposed solutions and implementation plans. It is also to provide examples of potential areas for additional guidance under HIPAA. Principle: Administrative requirements: requires covered entities to analyze their own needs and implement solutions appropriate for their own environment based on a basic set of requirements for which they are accountable; HHS's initiative: * HHS's privacy and security solutions contractor is to provide a nationwide summary of statewide assessments of organization-level privacy-and security-related policies and practices that affect interoperable electronic health information exchange, along with proposed solutions and implementation plans. It is also to provide examples of potential areas for additional guidance under HIPAA; * Initial work of the AHIC privacy subgroup is to include work on policies for breaches of personal health information confidentiality; * NCVHS recommended that HHS develop a set of strong enforcement measures that produces high levels of compliance with the rules applicable to the NHIN on the part of custodians of personal health information, but does not impose an excessive level of complexity or cost; ensure policies requiring a high level of compliance are built into the NHIN architecture; ensure appropriate penalties be imposed for violations committed by any individual or entity; ensure that individuals whose privacy is breached are entitled to reasonable compensation; and, if necessary, amend the HIPAA Privacy Rule to increase the responsibility of covered entities to control the practices of business associates. Principle: Authorization: requires covered entities to obtain the individual's written authorization or consent for uses and disclosures of personal health information with certain exceptions, such as for treatment, payment, and health care operations, or as required by law. Covered entities may choose to obtain the individual's consent to use or disclose protected health information to carry out treatment, payment, or health care operations but are not required to do so; HHS's initiative: * HHS's privacy and security solutions contractor is to provide a nationwide summary of statewide assessments of organization-level privacy-and security-related policies and practices that affect interoperable electronic health information exchange, along with proposed solutions and implementation plans. It is also to provide examples of potential areas for additional guidance under HIPAA; * NCVHS recommended that individuals have the right to decide whether they want to have their personally identifiable electronic health records accessible via NHIN and that HHS should monitor the development of approaches for allowing individuals to opt in or opt out of participation; * Initial work of the AHIC privacy subgroup will also include work on guidelines and processes to determine appropriate secondary uses of data. Source: GAO analysis of HHS data. [End of table] HHS has taken steps to identify solutions for protecting personal health information through its various privacy-related initiatives. For example, during the past 2 years HHS has defined initial criteria and procedures for certifying electronic health records, resulting in the certification of 35 IT vendor products. However, the other contracts have not yet produced final results. For example, the privacy and security solutions contractor has not yet reported its assessment of state and organizational policy variations. Additionally, HHS has not accepted or agreed to implement the recommendations made in June 2006 by the NCVHS, and the AHIC Privacy, Security, and Confidentiality Workgroup is in very early stages of efforts that are intended to result in privacy policies for nationwide health information exchange. HHS is in the early phases of identifying solutions for safeguarding personal health information exchanged through a nationwide health information network and has therefore not yet defined an approach for integrating its various efforts or for fully addressing key privacy principles. For example, milestones for integrating the results of its various privacy-related initiatives and resolving differences and inconsistencies have not been defined, nor has it been determined which entity participating in HHS's privacy-related activities is responsible for integrating these various initiatives and the extent to which their results will address key privacy principles. Until HHS defines an integration approach and milestones for completing these steps, its overall approach for ensuring the privacy and protection of personal health information exchanged throughout a nationwide network will remain unclear. The Health Care Industry Faces Challenges in Protecting Electronic Health Information: The increased use of information technology to exchange electronic health information introduces challenges to protecting individuals' personal health information. Key challenges are understanding and resolving legal and policy issues, particularly those resulting from varying state laws and policies; ensuring appropriate disclosures of the minimum amount of health information needed; ensuring individuals' rights to request access to and amendments of health information to ensure it is correct; and implementing adequate security measures for protecting health information. Table 3 summarizes these challenges. Table 3: Challenges to Exchanging Electronic Health Information: Area: Understanding and resolving legal and policy issues; * Resolving uncertainties regarding varying the extent of federal privacy protection required of various organizations; * Understanding and resolving data-sharing issues introduced by varying state privacy laws and organization-level practices; * Reaching agreement on organizations' differing interpretations and applications of HIPAA privacy and security rules; * Determining liability and enforcing sanctions in cases of breach of confidentiality. Area: Ensuring appropriate disclosure; * Determining the minimum data necessary that can be disclosed in order for requesters to accomplish their intended purposes; * Obtaining individuals' authorization and consent for use and disclosure of personal health information; * Determining the best way to allow individuals to participate in and consent to electronic health information exchange; * Educating consumers so that they understand the extent to which their consent to use and disclose health information applies. Area: Ensuring individuals' rights to request access and amendments to health information to ensure it is correct; * Ensuring that individuals understand that they have rights to request access and amendments to their own health information to ensure that it is correct; * Ensuring that individuals' amendments are properly made and tracked across multiple locations. Area: Implementing adequate security measures for protecting health information; * Determining and implementing adequate techniques for authenticating requesters of health information; * Implementing proper access controls and maintaining adequate audit trails for monitoring access to health data; * Protecting data stored on portable devices and transmitted between business partners. Source: GAO analysis of information provided by state-level health information exchange organizations, federal health care providers, and health IT professional associations. [End of table] Understanding and Resolving Varying Legal and Policy Issues: Health information exchange organizations bring together multiple and diverse health care providers, including physicians, pharmacies, hospitals, and clinics that may be subject to varying legal and policy requirements for protecting health information. As health information exchange expands across state lines, organizations are challenged with understanding and resolving data-sharing issues introduced by varying state privacy laws. Differing interpretations and applications of the privacy protection requirements of HIPAA and other privacy laws further complicate the ability of health information organizations to exchange data and to determine liability and enforce sanctions in cases of breach of confidentiality. Differing legal requirements for protecting health information introduce challenges to the ability to share health information among multiple stakeholders that may not be covered to the same extent by HIPAA's privacy and security rules. Providers that are members of health information organizations are typically covered by the privacy and security requirements of HIPAA, but the information exchange organizations that provide the technology and infrastructure to conduct information exchange generally are not covered entities. Rather, they are usually thought of as business associates that are contractually bound through agreements with covered entities to provide protections to the health information that they manage but are not directly covered by the HIPAA privacy and security rules. An official with one health information exchange organization stated that he found it hard to determine if his organization was a covered entity or a business associate. In some cases, according to an official with a health information privacy professional association, health information exchange organizations may not even be business associates as defined by HIPAA. The differences between or uncertainty regarding the extent of federal privacy protection required of various organizations may affect providers' willingness to exchange patients' health information if they do not believe it will be protected to the same extent they protect it themselves. In June 2006, NCVHS recommended that, if necessary, HHS amend the HIPAA Privacy Rule to increase the responsibility of covered entities to control the practices of business associates. The need to reconcile differences in varying state laws' privacy protection requirements introduces another widely acknowledged challenge to ensuring the privacy protection of health information exchanged on a nationwide basis. As health information exchange officials in states with strong privacy protections consider exchanging health information with organizations in other states, they will need to determine the extent to which they could share health information with organizations in states that have less stringent or no state-level laws and policies. For example, an official with one health information exchange organization described its state's privacy laws as being much more stringent than federal requirements, while a health information exchange official in another state told us that HIPAA's privacy requirements are the only laws that apply to the information exchanged by its organization. In this case, according to the official with the first organization, it would share more health information with providers in its own state than it would with providers in the other state because the other state's less stringent privacy protection laws would not provide a sufficient level of protection. HHS recognized that sharing health information among entities in states with varying laws introduces challenges and intends to identify variations in state laws that affect privacy and security practices through the privacy and security solutions contract that it awarded in 2005. Organizations also described another challenge associated with understanding and resolving legal and policy requirements for protecting electronic health information exchanged among multiple and diverse organizations. Differing interpretations and applications of the HIPAA privacy and security rules by providers and health information exchange organizations can result in disagreement about the data that can be exchanged and with whom the data can be shared. An official with one health information exchange described differing applications of HIPAA's security requirements that affect the way systems are administered and hinder the exchange of health information. For example, to protect individuals' information from inappropriate disclosure, the organization requires that the systems' list of users be forwarded to managers so that they can review roles and access rights at least annually. HIPAA's requirements do not specify protections at this level of granularity, so other organizations may not require this level of activity. This can create disagreements between organizations about the data that can be exchanged and with whom data can be shared if one organization does not administer access rights as strictly as another. Health information exchange organizations described difficulties with determining liability and enforcing sanctions in cases of confidentiality breaches. As the number of health information exchange organizations increases and information is shared on a widespread basis, determination of liability for improper disclosure of information will become more important but also more difficult. For example, the Markle Foundation described problems with tracing the source of a privacy violation and determining the responsible entity.[Footnote 23] Without such information, it becomes very difficult, if not impossible, to enforce sanctions for violations and breaches of confidentiality. Ensuring Appropriate Disclosure: Several organizations described issues associated with ensuring appropriate disclosure, such as determining the minimum data necessary that can be disclosed in order for requesters to accomplish the intended purposes for the use of the health information. For example, dieticians and health claims processors do not need access to complete health records, whereas treating physicians generally do. According to VA officials, the agency's ability to ensure appropriate disclosure is further complicated by the fact that the Veterans' Benefits Act prevents disclosure of certain information, such as information related to HIV infection, sickle cell anemia, and substance abuse, which must be removed from individuals' health records before the requested information is disclosed. Additionally, VA's current manual process for determining the legal authority for disclosures and the minimum amount of information authorized to be disclosed is difficult to automate because of the complexity of various privacy laws and regulations. Organizations also described issues with obtaining individuals' authorization and consent for uses and disclosures of personal health information. For example, health information exchange organizations may provide individuals with the ability to either opt in or opt out of electronic health information exchange. The opt-in approach requires that health care providers obtain the explicit permission of individuals before allowing their information to be shared with other providers. Without this permission, an individual's personal health information would not be accessible. The opt-out approach presumes that an individual's personal health information is available to authorized persons, but any individual may elect to not participate. Another approach taken by health information organizations simply notifies individuals that their information will be exchanged with providers throughout the organization's network. Several organizations described difficulties with determining the best way to allow individuals to participate in and consent to electronic health information exchange. While the opt-in approach increases individual autonomy, it is more administratively burdensome than the opt-out approach and may result in fewer individuals participating in health information exchange. The opt-out approach is easier, less costly, and may result in greater participation in health information exchange, but does not provide the autonomy that the opt-in approach does. The notification approach is the simplest to administer but provides individuals no choice regarding participation in the organization's data exchange. In June 2006, NCVHS recommended to the Secretary of HHS that the department monitor the development of opt-in and opt-out approaches; consider local, regional, and provider variations of consent options; collect evidence on the health, economic, social, and other implications of opt-in and opt-out approaches; and continue an open, transparent, and public process to evaluate whether a national policy on opting in or opting out is appropriate. Organizations also described the need to effectively educate consumers so that they understand the extent to which their consent or authorization to use and disclose health information applies. For example, one organization stated that a request made to limit use and disclosure at one facility in a network may not apply to other facilities within the same network, but consumers may assume the limitations do apply to all facilities and not take steps to limit disclosure in those other facilities. Ensuring Individuals' Rights to Request Access and Amendments to Health Information: As the exchange of personal health information expands to include multiple providers and as individuals' health records include increasing amounts of information from many sources, keeping track of the origin of specific data and ensuring that incorrect information is corrected and removed from future health information exchange could become increasingly difficult. Several organizations described challenges with ensuring that individuals have access to and the ability to amend their own health information and with ensuring that amendments are made and tracked throughout their information exchange organizations. Officials with HHS's Indian Health Service described a challenge with ensuring that individuals' amendments to their own health information are properly made and tracked. Additionally, as individuals amend their health information, HIPAA requires that covered entities make reasonable efforts to notify or alert and send the corrected information to certain providers and other persons that previously received the individuals' information. Meeting this requirement was described as a challenge by officials with VA, and it is expected to become more prevalent as the numbers of organizations exchanging health information increases. Officials with DOD described difficulties with ensuring that individuals' amendments to health information are distributed across multiple facilities within its network of medical facilities. The department is addressing this problem through the implementation of electronic health records and information management tools that track requests for amendments and their status. Additionally, an official with a professional association described the need to educate consumers to ensure that they understand their rights to request access to and amendments of their own health information to ensure that it is correct. Implementing Adequate Security Measures for Protecting Health Information: Organizations described the adequate implementation of security measures as another challenge that must be overcome to protect health information. For example, health information exchange organizations described difficulties with determining and implementing adequate techniques for authenticating requesters of health information, such as the use of passwords and security tokens. User authentication will become more difficult as health information exchange expands across multiple organizations that employ different techniques. The AHIC Confidentiality, Privacy, and Security Workgroup recognized this difficulty and identified user authentication as one of its initial work areas for protecting confidentiality and security. Implementing proper access controls, particularly role-based access controls, was also cited as a challenge to determining the information to which requesters may have access. Several organizations stated that maintaining adequate audit trails for monitoring access to health information is difficult but is necessary to ensure that information is adequately protected. Organizations described problems introduced by the need to protect health information stored on portable devices and data transmitted between business partners. The use of laptops and other portable media by health information exchange employees presents a challenge to organizations since the data stored on these media should be encrypted to be secure. The VA is also faced with limitations related to the need to encrypt electronic health information shared with its business partners. According to VA officials, the agency and its business partners' solutions must be compatible in order to share the encrypted data, and VA's deployment of encryption solutions is limited. Encryption of data can be challenging, as organizations often must implement hardware and complex software technology to achieve adequate protection. Conclusions: As the use of health IT and the exchange of electronic health information increases, concerns about the protection of personal health information exchanged electronically within a nationwide health information network have also increased. HHS and its Office of the National Coordinator for Health IT have initiated activities that, collectively, are intended to address aspects of key privacy principles. While progress has been made through the various initiatives, HHS has not yet defined an approach and milestones for integrating its efforts, resolving differences and inconsistencies between them, and fully addressing key privacy principles. As the use of health IT and electronic information exchange networks expands, health information exchange organizations are faced with challenges to ensuring the protection of health information, including understanding and resolving legal and policy issues, ensuring that the minimum information necessary is disclosed only to those entities authorized to request the information, ensuring individuals' rights to request access and amendments to health information, and implementing adequate security measures. These challenges are expected to become more prevalent as more information is exchanged and as electronic health information exchange expands to a nationwide basis. HHS's current initiatives are intended to address many of these challenges. However, without a clearly defined approach that establishes milestones for integrating its efforts and fully addresses key privacy principles and these challenges, it is likely that HHS's goal to safeguard personal health information as part of its national strategy for health IT will not be met. Recommendation for Executive Action: We recommend that the Secretary of Health and Human Services define and implement an overall approach for protecting health information as part of the strategic plan called for by the President. This approach should (1) identify milestones and the entity responsible for integrating the outcomes of its privacy-related initiatives, including the results of its four health IT contracts and recommendations from the NCVHS and AHIC advisory committees; (2) ensure that key privacy principles in HIPAA are fully addressed; and (3) address key challenges associated with legal and policy issues, disclosure of personal health information, individuals' rights to request access and amendments to health information, and security measures for protecting health information within a nationwide exchange of health information. Agency Comments and Our Evaluation: We received written comments on a draft of this report from HHS's Assistant Secretary for Legislation. The Assistant Secretary disagreed with our recommendation. Throughout the comments, the Assistant Secretary referred to the department's comprehensive and integrated approach for ensuring the privacy and security of health information within nationwide health information exchange. However, an overall approach for integrating the department's various privacy-related initiatives has not been fully defined and implemented. We acknowledge in our report that HHS has established a strategic objective to protect consumer privacy along with two specific strategies for meeting this objective: (1) support the development and implementation of appropriate privacy and security policies, practices, and standards for electronic health information exchange, and (2) develop and support policies to protect against discrimination from health information. Our report also acknowledges the key efforts that HHS has initiated to address this objective, and HHS's comments describe these and additional state and federal efforts. HHS stated that the department has made significant progress in integrating these efforts. While progress has been made initiating these efforts, much work remains before they are completed and the outcomes of the various efforts are integrated. Thus, we recommended that HHS define and implement a comprehensive privacy approach that includes milestones for integration, identifies the entity responsible for integrating the outcomes of its privacy-related initiatives, addresses key privacy principles, and ensures that challenges are addressed in order to meet the department's objective to protect the privacy of health information exchanged within a nationwide health information network. HHS specifically disagreed with the need to identify milestones and stated that tightly scripted milestones would impede HHS's processes and preclude stakeholder dialogue on the direction of important policy matters. We disagree and believe that milestones are important for setting targets for implementation and informing stakeholders of HHS's plans and goals for protecting personal health information as part of its efforts to achieve nationwide implementation of health IT. Milestones are especially important considering the need for HHS to integrate and coordinate the many deliverables of its numerous ongoing and remaining activities. We agree that it is important for HHS to continue to actively involve both public and private sector health care stakeholders in its processes. HHS did not comment on the need to identify an entity responsible for the integration of the department's privacy-related initiatives, nor did it provide information regarding any effort to assign responsibility for this important activity. HHS neither agreed nor disagreed that its approach should address privacy principles and challenges, but stated that the department plans to continue to work toward addressing privacy principles in HIPAA and that our report appropriately highlights efforts to address challenges encountered during electronic health information exchange. HHS stated that the department is committed to ensuring that health information is protected as part of its efforts to achieve nationwide health information exchange. HHS also disagreed with our conclusion that without a clearly defined privacy approach, it is likely that HHS's objective to protect personal health information will not be met. We believe that an overall approach is needed to integrate the various efforts, provide assurance that HHS's initiatives continue to address key privacy principles (as we illustrate in table 2 of the report), and to ensure that key challenges faced by health information exchange stakeholders are effectively addressed. HHS also provided technical comments that we have incorporated into the report as appropriate. HHS's written comments are reproduced in appendix VI. In written comments, the Secretary of VA concurred with our findings, conclusions, and recommendation to the Secretary of HHS and commended our efforts to highlight methods for ensuring the privacy of electronic health information. VA also provided technical comments that we have incorporated into the report as appropriate. VA's written comments are reproduced in appendix VII. DOD chose not to comment on a draft of this report. As agreed with your offices, unless you publicly announce its contents earlier, we plan no further distribution of this report until 30 days from the date on the report. At that time, we will send copies of the report to other Chairmen and Ranking Minority Members of other Senate and House committees and subcommittees that have authorization and oversight responsibilities for health information technology. We will also send copies of the report to the Secretaries of Defense, Health and Human Services, and Veterans Affairs. Copies of this report will also be made available at no charge on our Web site at [Hyperlink, http://www.gao.gov]. If you have any questions on matters discussed in this report, please contact me at (202) 512-6240 or David Powner at (202) 512-9286, or by e- mail at koontzl@gao.gov or pownerd@gao.gov. Contact points for our offices of Congressional Relations and Public Affairs may be found on the last page of this report. Other contacts and key contributors to this report are listed in appendix VIII. Signed by: Linda D. Koontz: Director, Information Management Issues: Signed by: David A. Powner: Director, Information Technology Management Issues: [End of section] Appendix I: Objectives, Scope, and Methodology: The objectives of our review were to: * describe the steps the Department of Health and Human Services (HHS) is taking to ensure privacy protection as part of the national health information technology (IT) strategy and: * identify challenges associated with meeting requirements for protecting personal health information within a nationwide health information network. To address our first objective, we analyzed information that we collected from agency documentation and through discussions with officials with HHS components and advisory committees that play major roles in supporting HHS's efforts to develop and implement a national strategy for health IT, including activities intended to ensure the protection of electronic health information exchanged within a nationwide health information network. Specifically, we reviewed and assessed privacy-related plans and documentation describing HHS's efforts to ensure privacy protection from HHS's Office of the National Coordinator for Health IT, Office for Civil Rights, Centers for Medicare and Medicaid Services and its Office for E-Health Standards and Services, and the Office of the Assistant Secretary for Planning and Evaluation. We also held discussions with and collected information from the American Health Information Community and the National Committee on Vital and Health Statistics, the Secretary's two primary advisory committees for health IT. We reviewed information from the Office of the National Coordinator for Health IT on the description and status of its plans to address health information privacy as part of its national health IT strategy. We identified recommendations that the American Health Information Community and the National Committee for Vital and Health Statistics made to the Secretary of Health and Human Services regarding protecting the privacy of electronic health information. We also reviewed documentation about the scope and status of privacy-related work currently planned or being conducted under several of the Office of the National Coordinator's health IT contracts that support its efforts to develop and implement a national health IT strategy. We reviewed procedures for enforcing privacy and security laws related to the protection of health information (i.e., the Health Information Portability and Accountability Act [HIPAA] privacy and security rules) from the Office for Civil Rights and the Office of E-Health Standards and Services. We also reviewed involvement by HHS's Agency for Healthcare Research and Quality, the National Institutes of Health, the Health Resources and Services Administration, the Substance Abuse and Mental Health Services Administration, and the Centers for Disease Control and Prevention in initiatives to ensure privacy protection related to the electronic exchange of health information within a nationwide health information network. We mapped the HHS privacy-related activities we identified to key privacy principles in the HIPAA Privacy Rule. We identified HHS activities that addressed specific aspects of these principles to describe the extent to which HHS's privacy-related initiatives are intended to address key privacy principles. To address the second objective, we analyzed documentation from and held discussions with officials from the federal agencies that provide health care services--the Departments of Defense and Veterans Affairs and the Indian Health Service--and representatives from selected state- level health information exchange organizations. We selected these organizations by conducting literature research and consulting with HHS and recognized health IT professional associations to identify existing health information exchange organizations. We initially identified more than 40 organizations and then conducted screening interviews to narrow the universe to 7 state-level health information exchange organizations that were actively exchanging health information electronically. To ensure that we identified challenges introduced by both federal privacy protection requirements and requirements that are more stringent than existing federal protections, we included states that do not have state laws that supersede federal requirements and states with privacy laws that are more stringent than federal laws. We selected state-level health information organizations from California, Florida, Indiana, Louisiana, Massachusetts, North Carolina, and Utah. We also included a telehealth network from Nebraska and a community health center network from Florida to ensure that we identified any privacy-related challenges unique to their health care IT environments. During interviews, we asked the health information exchange organizations to provide examples of challenges associated with protecting the privacy of health information that they encountered with the implementation of electronic health information exchange networks, along with challenges that they anticipated would be introduced by the nationwide health information exchange being proposed by HHS. We also held discussions with HHS officials with the Agency for Healthcare Research and Quality, the National Institutes of Health, the Health Resources and Services Administration, the Substance Abuse and Mental Health Services Administration, and the Centers for Disease Control and Prevention to collect examples of challenges those organizations and their stakeholders face in attempting to address federal privacy and security requirements. To gain further insight into the challenges organizations face in protecting privacy while exchanging electronic health information, we contacted representatives from nationally recognized health IT professional organizations. We held discussions with officials from the American Health Information Management Association, the American Medical Informatics Association, the eHealth Initiative, the Healthcare Information and Management Systems Society, the Markle Foundation, and the Public Health Informatics Institute to discuss challenges these organizations faced that are associated with protecting electronic health information. We also gathered relevant information about the challenges in protecting privacy within health information exchange from officials with the Health Privacy Project, the Vanderbilt Center for Better Health, Kaiser Permanente, and NHII Advisors, a health information consulting firm. We reviewed and analyzed the information provided by the health information exchange organizations, federal health care providers, and professional associations to identify key challenges associated with the electronic exchange of personal health information throughout the health care industry. To characterize the challenges that we identified, we analyzed the specific examples of challenges and categorized them into four broad areas of challenges--understanding and resolving legal and policy issues, ensuring appropriate disclosures of health information, ensuring individuals' rights to access and amend health information, and implementing adequate security measures for protecting health information. We conducted our work from December 2005 through November 2006 in the Washington, D.C., area in accordance with generally accepted government auditing standards. [End of section] Appendix II: Major Federal Health Care Programs: The following table includes the major federal programs that provide health care services for U.S. citizens, the number of beneficiaries for each program, and the cost of each program for 2004. Table 4: Federal Programs: Federal agency: HHS; Program: Medicare; Beneficiaries: 42 million elderly and disabled beneficiaries; Expenditure (dollars in billions): $301.5. Federal agency: HHS; Program: Medicaid; Beneficiaries: 57.6 million low-income persons; Expenditure (dollars in billions): 297.5; (joint federal and state). Federal agency: HHS; Program: State Children's Health Insurance Program; Beneficiaries: 6.8 million children; Expenditure (dollars in billions): 6.6; (joint federal and state). Federal agency: HHS; Program: Indian Health Service; Beneficiaries: 1.8 million Native Americans and Alaska Natives; Expenditure (dollars in billions): 3.7. Federal agency: Veterans Affairs (VA); Program: Veterans Health Administration; Beneficiaries: 5.2 million veterans; Expenditure (dollars in billions): 26.8. Federal agency: Department of Defense (DOD); Program: TRICARE Program; Beneficiaries: 8.3 million active-duty military personnel and their families and military retirees; Expenditure (dollars in billions): 30.4. Federal agency: Office of Personnel Management (OPM); Program: Federal Employees Health Benefit Program; Beneficiaries: 8 million federal employees, retirees, and dependents; Expenditure (dollars in billions): 27. Source: HHS, VA, DOD, and OPM budget documents. [End of table] [End of section] Appendix III: HHS Health IT Contracts: The following table describes key health IT contracts awarded by the HHS Office of the National Coordinator for Health IT. Table 5: HHS Health IT Contracts: Contract: American Health Information Community Program Support; Date awarded: September 2005; Initial duration: 1 year; Initial cost (in millions): $0.8; Extended duration: First option year; Additional cost (in millions): 2.2; Duration: 2 years; Total cost (in millions): $3.0; Description: To provide assistance to the National Coordinator in convening and managing the meetings and activities of the health care community to ensure that the health IT plan is seamlessly coordinated. Contract: Standards Harmonization Process for Health IT; Date awarded: September 2005; Initial duration: 1 year; Initial cost (in millions): 3.2; Extended duration: Phase II 1 year; Additional cost (in millions): 3.9; Duration: 2 years; Total cost (in millions): 7.1; Description: To develop and test a process for identifying, assessing, endorsing, and maintaining a set of standards required for interoperable health information exchange. Contract: Compliance Certification Process for Health IT; Date awarded: September 2005; Initial duration: 1 year; Initial cost (in millions): 2.8; Extended duration: Phase II 1 year; Additional cost (in millions): 2.9; Duration: 2 years; Total cost (in millions): 5.7; Description: To develop and evaluate a compliance certification process for health IT, including the infrastructure components through which these systems interoperate. Contract: Privacy and Security Solutions for Interoperable Health Information Exchange[A]; Date awarded: September 2005; Initial duration: 1½ years; Initial cost (in millions): 17.2 (Increased by $6 million in August 2006 to include additional studies); Extended duration: n/a; Additional cost (in millions): n/a; Duration: 1½ years; Total cost (in millions): 17.2; Description: To assess and develop plans to address variations in organization-level business policies and state laws that affect privacy and security practices that may pose challenges to an interoperable health information exchange. Contract: Nationwide Health Information Network Prototypes; Date awarded: November 2005; Initial duration: 1 year; Initial cost (in millions): 18.6 (4 contracts); Extended duration: Base year extended by 3 months; Additional cost (in millions): 4.4; Duration: 1¼ years; Total cost (in millions): 23.0; Description: To develop and evaluate prototypes for a nationwide health information network architecture to maximize the use of existing resources such as the Internet to achieve widespread interoperability among software applications, particularly electronic health records. These contracts are also intended to spur technical innovation for nationwide electronic sharing of health information in patient care and public health settings. Contract: Measuring the Adoption of Electronic Health Records; Date awarded: September 2005; Initial duration: 2 years; Initial cost (in millions): 1.8; Extended duration: n/a; Additional cost (in millions): n/a; Duration: 2 years; Total cost (in millions): 1.8; Description: To develop a methodology to better characterize and measure the state of electronic health records adoption and determine the effectiveness of policies aimed at accelerating adoption of electronic health records and interoperability. Contract: Gulf Coast Electronic Digital Health Recovery; Date awarded: September 2005; Initial duration: 1 year; Initial cost (in millions): 3.7; Extended duration: n/a; Additional cost (in millions): n/ a; Duration: 1 year; Total cost (in millions): 3.7; Description: To plan and promote the widespread use of electronic health records and digital health information recovery in the Gulf Coast regions affected by hurricanes last year. Contract: State Alliance for e-Health; Date awarded: October 2006; Initial duration: 1 year; Initial cost (in millions): 1.9; Extended duration: n/a; Additional cost (in millions): n/a; Duration: 1 year; Total cost (in millions): 1.9; Description: To form a high-level steering committee that includes governors and state executives to identify and resolve issues that may present barriers to the formation of health information networks, including privacy, security, licenses and other legal issues, and health information exchanges. Source: HHS Office of the National Coordinator for Health Information Technology. [A] Jointly managed by the Agency for Healthcare Research and Quality and the Office of the National Coordinator. [End of table] [End of section] Appendix IV: The Office of the National Coordinator for Health IT's Goals, Objectives, and Strategies: The following table describes the Office of the National Coordinators' current goals, objectives, and strategies and indicates which strategies are initiated, which are under active discussion, and which require future consideration. Table 6: Goals, Objectives, and Strategies of the Office of the National Coordinator: Goal: Goal 1: Inform health care professionals; Objective: High-value electronic health records; High-level strategy: Simplify health information access and communication among clinicians[A]. Goal: Goal 1: Inform health care professionals; Objective: High-value electronic health records; High-level strategy: Increase incentives for clinicians to use electronic health records[C]. Goal: Goal 1: Inform health care professionals; Objective: Low-cost and low-risk electronic health records; High-level strategy: Foster economic collaboration for electronic health records adoption[B]. Goal: Goal 1: Inform health care professionals; Objective: Low-cost and low-risk electronic health records; High-level strategy: Lower total cost of electronic health records purchase and implementation[B]. Goal: Goal 1: Inform health care professionals; Objective: Low-cost and low-risk electronic health records; High-level strategy: Lower risk of electronic health records adoption[A]. Goal: Goal 1: Inform health care professionals; Objective: Current clinical knowledge; High-level strategy: Increase investment in sources of evidence-based knowledge[C]. Goal: Goal 1: Inform health care professionals; Objective: Current clinical knowledge; High-level strategy: Increase investment in tools that can access and integrate evidence-based knowledge in the clinical setting[C]. Goal: Goal 1: Inform health care professionals; Objective: Current clinical knowledge; High-level strategy: Establish mechanisms that will allow clinicians to empirically access information and other patient characteristics that can better inform their clinical decisions[C]. Goal: Goal 1: Inform health care professionals; Objective: Equitable adoption of electronic health records; High-level strategy: Ensure low-cost electronic health records for clinicians in underserved areas[C]. Goal: Goal 1: Inform health care professionals; Objective: Equitable adoption of electronic health records; High-level strategy: Support adoption and implementation by disadvantaged providers[C]. Goal: Goal 2: Interconnect health care; Objective: Widespread adoption of standards; High-level strategy: Establish well-defined health information standards[A]. Goal: Goal 2: Interconnect health care; Objective: Widespread adoption of standards; High-level strategy: Ensure federal agency compliance with health information standards[A]. Goal: Goal 2: Interconnect health care; Objective: Widespread adoption of standards; High-level strategy: Exercise federal leadership in health information standards adoption[A]. Goal: Goal 2: Interconnect health care; Objective: Sustainable electronic health information exchange; High- level strategy: Stimulate private investment to develop the capability for efficient sharing of health information[B]. Goal: Goal 2: Interconnect health care; Objective: Sustainable electronic health information exchange; High-level strategy: Use government payers and purchasers to foster interoperable electronic health information exchange[C]. Goal: Goal 2: Interconnect health care; Objective: Sustainable electronic health information exchange; High-level strategy: Adapt federal agency health data collection and delivery to NHIN solutions[C]. Goal: Goal 2: Interconnect health care; Objective: Sustainable electronic health information exchange; High-level strategy: Support state and local governments and organizations to foster electronic health information exchange[B]. Goal: Goal 2: Interconnect health care; Objective: Consumer privacy and risk protections; High-level strategy: Support the development and implementation of appropriate privacy and security policies, practices, and standards for electronic health information exchange[A]. Goal: Goal 2: Interconnect health care; Objective: Consumer privacy and risk protections; High-level strategy: Develop and support policies to protect against discrimination from health information[C]. Goal: Goal 3: Personalize health management; Objective: Consumer use of personal health information; High-level strategy: Establish value of personal health records, including consumer trust[B]. Goal: Goal 3: Personalize health management; Objective: Consumer use of personal health information; High-level strategy: Expand access to personal health management information and tools[A]. Goal: Goal 3: Personalize health management; Objective: Remote monitoring and communications; High-level strategy: Promote adoption of remote monitoring technology for communication between providers and patients[A]. Goal: Goal 3: Personalize health management; Objective: Care based on culture and traits; High-level strategy: Promote consumer understanding and provider use of personal genomics for prevention and treatment of hereditary conditions[C]. Goal: Goal 3: Personalize health management; Objective: Care based on culture and traits; High-level strategy: Promote multicultural information support[C]. Goal: Goal 4: Improve population health; Objective: Automated public health and safety monitoring and management; High-level strategy: Enable simultaneous flow of clinical care data to and among local, state, and federal biosurveillance programs[A]. Goal: Goal 4: Improve population health; Objective: Automated public health and safety monitoring and management; High-level strategy: Ensure that the nationwide health information network supports population health reporting and management[C]. Goal: Goal 4: Improve population health; Objective: Efficient collection of quality information; High-level strategy: Develop patient-centric quality measures based on clinically relevant information available from interoperable longitudinal electronic health records[B]. Goal: Goal 4: Improve population health; Objective: Efficient collection of quality information; High-level strategy: Ensure adoption of uniform performance measures by health care stakeholders[C]. Goal: Goal 4: Improve population health; Objective: Efficient collection of quality information; High-level strategy: Establish standardized approach to centralized electronic data capture and reporting of performance information[C]. Goal: Goal 4: Improve population health; Objective: Transformation of clinical research; High-level strategy: No strategies identified. Goal: Goal 4: Improve population health; Objective: Health information support in disasters and crises; High- level strategy: Foster the availability of field electronic health records to clinicians responding to disasters[A]. Goal: Goal 4: Improve population health; Objective: Health information support in disasters and crises; High-level strategy: Improve coordination of health information flow during disasters and crises[C]. Goal: Goal 4: Improve population health; Objective: Health information support in disasters and crises; High-level strategy: Support management of health emergencies[C]. Source: HHS Office of the National Coordinator for Health IT. [A] Strategy has been initiated. [B] Strategy is under active consideration. [C] Strategy requires future discussion. [End of table] [End of section] Appendix V: Descriptions of Federal Laws for Protecting Personal Health Information: There are several federal statutes that protect personal health information. HIPAA provides the most extensive and specific protection. However, other federal statutes, although not always focused specifically on health information, nonetheless have the effect of protecting personal health information in specific situations. This table presents an outline of selected federal laws that protect personal health information. Table 7: Selected Federal Laws that Protect Personal Health Information: Law: HIPAA. Law: HIPAA administrative simplification provisions and regulations; Protected information: Certain individually identifiable health information transmitted by or maintained in electronic or any other form or medium by a covered entity; Protection provided: Disclosure of health information prohibited except as permitted by the Privacy Rule. The Security Rule requires that the security, integrity, and confidentiality of health information must be ensured; Applicability: Covered entities, which are defined as health plans, health care clearinghouses, and health care providers who transmit health information electronically in connection with authorized transactions. Privacy protections applicable to federal government agencies: Law: Privacy Act of 1974; Protected information: Agency-controlled information about an individual that is retrieved by the individual's name or other personal identifier; Protection provided: Prohibits use and disclosure of personal records without consent of individual, or as otherwise permitted under the law; requires protection of personal records, disclosure of which could cause harm, embarrassment, unfairness, or inconvenience to the individual; Applicability: Executive agencies that hold information in a system of records (the law provides certain exceptions). Law: Freedom of Information Act of 1966; Protected information: Federal agency records; Protection provided: Act exempts from public release individually identifiable medical information, disclosure of which would constitute a clearly unwarranted invasion of personal privacy; Applicability: Executive federal agencies. Law: Social Security Act; Protected information: Individually identifiable records and information held by an agency regarding program beneficiaries' records and information that is transmitted to, or obtained by or from HHS, Social Security Administration (SSA), and their contractors incident to carrying out agency duties; Protection provided: Prohibits unauthorized disclosure of individually identifiable records and makes unauthorized disclosure a crime; Applicability: HHS, SSA, and their contractors. Law: Veterans Omnibus Health Care Act of 1976; Protected information: Confidential medical records of treatment relating to the treatment of drug abuse, alcoholism or alcohol abuse, infection with the human immunodeficiency virus, or sickle cell anemia; Protection provided: Personally identifiable patient information provided or obtained in connection with treatment, education, evaluation, or research of certain conditions or diseases must be kept confidential, except with patient's written consent, or within VA, Department of Justice, or DOD; Applicability: VA. Provisions protecting health information in limited situations: Law: Medicare Prescription Drug, Improvement, and Modernization Act of 2003; Protected information: Program beneficiaries' prescription drug, medication, and medical history information; Protection provided: Prescription drug plan sponsors must comply with HIPAA Privacy Rule and Security Rule requirements; Applicability: Prescription drug plan pharmacies and sponsors of prescription drug plans. Law: Clinical Laboratory Improvement Amendments of 1988; Protected information: Medical information of patients and clinical study subjects; Protection provided: Certain clinical laboratories are required to ensure confidentiality of test results or reports and may disclose such information only to authorized persons as defined by state or federal law; Applicability: Certain clinical laboratories conducting patient tests. Law: Public Health Service Act Health Omnibus Programs Extension of 1988; Protected information: Personal identifying information of individual subjects of biomedical, behavioral, clinical, or other research; Protection provided: The Secretary of HHS may issue a certificate of confidentiality to researchers engaged in biomedical, behavioral, clinical, or other research to protect any identifying research information from disclosure, including "compulsory legal demands"; Applicability: Research programs. Law: Public Health Service Act Federal Confidentiality Requirements for Substance Abuse Patient Records; Protected information: Patient alcohol and drug abuse treatment records; Protected provided: Personally identifiable patient records maintained in connection with performance of drug abuse or substance abuse treatment must be kept confidential, absent patient consent or court order; Applicability: Federally assisted alcohol or substance abuse programs or activities. Law: Family Educational Rights and Privacy Act; Protection of Pupil Rights Amendment (covered education records are excluded under HIPAA's privacy and security regulations); Protected information: Personally identifiable information in students' educational records; examination, testing, or treatment for mental or psychological conditions; Protection provided: Prohibits disclosure of protected information other than as needed within educational institution or by local or state educational agency, absent consent of parent, or student that has reached 18 years of age; Applicability: Educational institution or agency that receives federal funds under the Department of Education programs; educational institutions that conduct non- Department of Education- funded surveys. Law: Americans with Disabilities Act; Protected information: Medical information or condition and health records of employees or applicants; Protection provided: Covered entities must treat employees' and applicants' medical information as confidential medical records, with certain limitations as specified in the law; Applicability: Employers of 15 or more employees, employment agencies, labor organizations, and joint labor management committees. Law: Financial Modernization (Gramm-Leach-Bliley) Act of 1999; Protected information: Nonpublic personal information, which is defined as any nonpublic personal financial information provided by a consumer to a financial institution; Protection provided: Prohibits disclosure of consumers' nonpublic personal information to nonaffiliated third parties without clients' consent; (Consumers must be afforded the opportunity to decline the institution's sharing their information with nonaffiliated third parties.); Applicability: Financial institutions, including certain health insurers. Source: GAO analysis of federal privacy laws: [End of table] [End of section] Appendix VI Comments from the Department of Health and Human Services: Office of the Assistant Secretary for Legislation: Department Of Health Human Services: Washington, D.C. 20201. Dec 29 2006: Ms. Linda D. Koontz: Director, Information Management Issues: U.S. Government Accountability Office: Washington, DC 20548: Dear Ms. Koontz: Enclosed are the Department's comments on the U.S. Government Accountability Office's (GAO) draft report entitled, "Health Information Technology: Early Efforts Initiated but Comprehensive Privacy Approach Needed for National Strategy" (GAO-07-238). The Department has provided several technical comments directly to your staff. The Department appreciates the opportunity to comment on this draft report before its publication. Sincerely, Signed by: Vincent J. Ventimiglia: Assistant Secretary for Legislation: Comments From The Department Of Health And Human Services (HHS) On The U.S. Government Accountability Office's (GAO) Draft Report: Health Information Technology: Early Efforts Initiated But Comprehensive Privacy Approach Needed For National Strategy (GAO-07-238): General Comments: The Department of Health and Human Services (HHS) appreciates the opportunity to review the draft Government Accountability Office's (GAO) report entitled "HEALTH INFORMATION TECHNOLOGY - Early Efforts Initiated but Comprehensive Privacy Approach Needed for National Strategy." HHS has established and is pursuing a deliberative, comprehensive, and integrated approach to ensure the privacy and security of health information within a nationwide health information technology (health IT) infrastructure. Although the GAO concludes otherwise, HHS continues to implement a "framework for strategic action," which it initially articulated in July 2004 and which continues to be a foundational guide for nationwide health IT adoption; and we fully believe that safeguarding personal health information is essential to our national strategy for health IT. The GAO draft report identifies numerous HHS projects, initiatives, and public-private collaborations underway that aggressively pursue the development of milestones for a nationwide health IT infrastructure premised on the privacy and security of health information; and while GAO concludes to the contrary, we believe the efforts highlighted in this report reflect HHS's comprehensive strategy to ensure that essential privacy and security protections are appropriately being integrated from the ground up into Federal solutions for interoperable health IT. In fact, the report's three recommendations well describe the activities HHS is currently engaged in to ensure the privacy and security of health information within a nationwide health IT infrastructure. Therefore, HHS does not concur with the GAO's conclusion that, ".HHS's goal to safeguard personal health information as part of its national strategy for health IT will not be met. (pg. 32)". GAO's first recommendation calls on HHS to identify milestones and an entity responsible for the integration of outcomes related to our privacy-related initiatives. HHS believes that the tightly scripted milestones GAO recommends would impede our processes and preclude necessary public-private dialogue and input into the approach and direction on these important policy matters. Second, GAO recommends that HHS's approach "ensure that key privacy principles defined by HIPAA are fully addressed." The HIPAA Privacy Rule establishes a Federal floor of protections for health information held by most health care providers, health plans, and health care clearinghouses, while allowing States and organizations to provide greater protections as they see fit. This Rule and the HIPAA Security Rule establish the foundation principles of, and form the context in which, HHS continues to implement a comprehensive strategy for health IT privacy and security policy. Lastly, GAO recommends that our approach "address key challenges associated with legal and policy issues, disclosure of personal health information, patients' right to access and amend health information, and security measures for protecting health information within a nationwide exchange of health information." The GAO report fittingly highlights the myriad complex collaborative efforts HHS is involved in to address the key challenges stated above. HHS is committed to ensuring that health information exchanged in nationwide network is protected. HHS's strategy recognizes the importance of collaboration with both the public and private sectors, including representation from consumers of healthcare services. Many of our activities rely on public input, recommendations from Federal advisory committees, and deliverables from contracts with a wide variety of healthcare and IT sector collaborators, among other sources. Nationwide health IT adoption can only be accomplished through a coordinated effort of many stakeholders, within both state and Federal governments and the private sector. HHS has taken great care to engage representatives of all these sectors in our many health IT initiatives - an effort that involves many processes and the work of thousands of participants. Forging ahead with solutions that have not been informed by input from consumer groups and others in the private sector would deny these key stakeholders an opportunity to voice both their concerns and recommendations for solutions in this complex and sensitive policy area. Thus, creating tightly scripted milestones that do not provide an opportunity to be informed by such public-private dialogue would preclude the input necessary to inform the government's next steps. These processes are part of a comprehensive strategy for addressing complex technical and healthcare delivery issues; they advance the national health IT agenda, with all of its potential for improving healthcare and the health of the population; and effectively secure health information and the privacy of our citizens. Overall, HHS's broad engagement in a full spectrum of contractual and other collaborative efforts reflect: a well-structured, comprehensive and dynamic strategy that addresses key privacy and security principles. These activities indicate that HHS is very much on track to define solutions that will provide solid protection of health information while concurrently improving the quality of care through advancing the adoption of interoperable health IT. HHS has invested significant resources and efforts on the nationwide strategy for protecting health information. Our national health IT agenda approaches privacy and security through a number of activities that both inform current work and prepare for future needs. As identified in this report, HHS already has a comprehensive portfolio of laws and activities to protect health information and define future needs for privacy and security protections as we move toward the President's vision for an interoperable health information technology infrastructure. HHS intends to draw upon these efforts to integrate privacy and security protections into meeting this vision. Our comprehensive strategy involves leveraging existing foundations, creating new public-private processes, partnering with states, health care organizations, and consumers to address state and business level protections, and considering privacy and security policies and implementation at a nationwide level. This multi-pronged, coordinated approach is designed to address each key element and constituent that will be required to enable a secure and consumer-focused nationwide transition to electronic health information exchange at all levels nationally. HHS efforts in each of these areas include: Existing Foundations: HHS has promulgated several rules that establish Federal confidentiality, privacy, and security protections for health information, including the HIPAA Privacy and Security Rules, and the Confidentiality of Alcohol and Drug Abuse Patient Records Regulation. The Privacy Rule establishes a Federal floor of protections for health information held by most health care providers, health plans, and health care clearinghouses, while allowing States and organizations to provide greater protections as they see fit. These Rules establish the foundation principles of, and form the context in which HHS continues to implement a comprehensive strategy for, health IT privacy and security policy. Furthermore, HHS, like other agencies, must follow and implement the Privacy Act of 1974, which provides additional protections for records maintained by federal agencies. State and Organizational Efforts: * Privacy and Security Solutions for Interoperable Health Information Exchange: Co-managed by the Agency for Healthcare Research and Quality (AHRQ) and the Office of the National Coordinator for Health IT (ONC), the Privacy and Security Solutions contract has fostered an environment where states and territories have been able to: (1) assess variations in organization-level business policies and state laws that affect health information exchange; (2) identify and propose practical solutions, while preserving the privacy and security requirements in applicable Federal and state laws; and (3) develop detailed plans to implement solutions to identified privacy and security challenges. These implementation plans will not only benefit the states and territories that have created them, but other ONC coordinated efforts such as the State Alliance for E-Health's Health Information Protection task force where interstate health information exchange issues can be harmonized nationwide. * State Alliance for E-Health: Under contract with ONC, the National Governors Association will work with Governors and Governor-named high- level executives of states and U.S. territories to establish a high- level health IT advisory board. This body will be charged with identifying, assessing and, through the formation of consensus solutions, mapping ways to resolve state-level health IT issues that affect multiple states and pose challenges to interoperable electronic health information exchange; providing a forum in which states may collaborate so as to increase the efficiency and effectiveness of the health IT initiatives that they develop; and focusing on privacy and security issues surrounding the use and disclosure of electronic health information. * Development of Best Practices for State HIE Initiatives: ONC has awarded a contract to the Foundation of Research and Education of the American Health Information Management Association (AHIMA) to gather information from existing state-level Health Information Exchanges and define, through a consensus-based process, best practiceS that can be disseminated across a broad spectrum of healthcare and governmental organizations. Information was gathered related to governance, legal, financial and operational characteristics, and health information exchange policies. The contractor analyzed findings to develop guiding principles and practical guidance for state-level health information exchanges. AHIMA developed a work book and final report to disseminate guiding principles, and recommendations on how to encourage conformance and coordination across state and federal initiatives. Federal Activities: * American Health Information Community and Confidentiality, Privacy, and Security Workgroup: In September 2005, the Secretary established the American Health Information Community (AHIC), a federally-chartered advisory committee made up of key leaders from the public and private sectors, charged with making recommendations to HHS on key health IT strategies. In the summer of 2006, the AHIC created a workgroup specifically focused on nationwide privacy and security issues raised by health IT activities and the findings of the other AHIC workgroups - privacy and security are one of the most consistent threads between each of the groups and their breakthrough projects. The first set of recommendations of this group will be presented to the AHIC in January 2007. * The Certification Commission for Healthcare Information Technology (CCHIT): In September 2005, ONC awarded a contract to CCHIT which was tasked with reducing barriers to the adoption of interoperable health information technologies through the creation of an efficient, credible and sustainable product certification program. The CCHIT membership includes a broad array of private sector representatives, including physicians and other healthcare providers, payers and purchasers, health IT vendors, and consumers. An important part of the task for CCHIT is to certify the security of health information systems. In each successive year, CCHIT will focus on security for ambulatory EHR systems, security for inpatient EHR systems and then security for network systems. The certification process CCHIT has developed promotes well-established, tested, security capabilities in health IT systems and certification will be a major contributor to protecting the privacy and confidentially of the data these systems manage. * Healthcare Information Technology Standards Panel (HITSP): In September 2005, ONC awarded a contract to the American National Standards Institute (ANSI) to identify standards for use in enhancing the exchange of interoperable health data. The process carried out by the Healthcare IT Standards Panel (HITSP) has created a unique and unprecedented opportunity to bring together the intellectual assets of over 260 organizations with a stake in health data standards that will increase the interoperability of healthcare systems and information. A critical part of the HITSP mission is to harmonize the critical standards necessary to protect the privacy and security of health data. The panel guides the collaboration of its member organizations through a Health IT standards harmonization process that leverages the work and membership of multiple standards development organizations along with the expertise from the public and private sector. The panel engages in a consensus-based process to select the most appropriate standard from existing standards, where available, and to identify gaps in standards where there are none to assure effective interoperability. HITSP ensures that objections by interested parties are appropriately addressed and resolved, that the proceedings remain open to the public, that the industry's interests are adequately balanced, and further, that due process is followed with the ability of interested parties to appeal the panel's decisions. Once standards have been identified to support specific clinical use-cases, the HITSP will develop implementation guides to support system developers' activities in pursuing interoperable electronic health records. * Nationwide Health Information Network (NHIN): In November 2005, ONC awarded contracts to four consortia to develop prototypes capable of demonstrating potential solutions for nationwide exchange of health information. This initiative is foundational to the President's vision for the widespread adoption of secure, interoperable health records within 10 years. The prototype architectures developed will provide a framework for a public-private discussion on needed capabilities to support secure health information exchange across the nation. Each contract includes three geographically distinct healthcare markets. The output of the NHIN initiative includes prototype architectures that include functional requirements, business models, the identification of needed standards, and prototype software implementations. It is anticipated that this "network of networks" that will form the NHIN will be constructed from interoperable health information exchanges and sustainable markets for health information service providers. A critical portion of the required NHIN deliverables is the development of security models that directly address systems architecture needs for securing and maintaining the confidentially of health data. Furthermore, each participant is required to comply with security requirements established by HHS to ensure proper and confidential handling of data and information and each is delivering important architecture capabilities that will be used in the next steps of the NHIN to address the complex issues of authentication, authorization, data access restrictions, auditing and logging, consumer controls of information access and other critical contributions. Summary: In summary, as the GAO report itself describes, HHS has made considerable progress integrating the activities and processes listed above into our overall strategy for ensuring privacy and security protections for health information in a health IT infrastructure. Each activity and process involves many participants and organizations and will play a critical role in ensuring privacy and security of health information while advancing the adoption of health IT. Each activity and process has numerous deliverables and milestones. Many of our initiatives involve complex collaborative efforts and HHS seeks to be responsive to public comments and concerns while coordinating these public-private initiatives. HHS is focused directly on these privacy and security policy issues and is coordinating the integration of these policy issues through the health IT technology efforts presented. [End of section] Appendix VII: Comments from the Department of Veterans Affairs: The Secretary Of Veterans Affairs: Washington: December 27, 2006: Ms. Linda D. Koontz: Director, Information Management Issues: Mr. David A. Powner: Director, Information Technology Issues: U. S. Government Accountability Office: 441 G Street, NW: Washington, DC 20548: Dear Ms. Koontz and Mr. Powner: The Department of Veterans Affairs (VA) has reviewed your draft report, Health Information Technology: Early Efforts Initiated but Comprehensive Privacy Approach Needed for National Strategy (GAO-07- 238). I concur with the Government Accountability Office's (GAO) findings and conclusions. I support GAO's recommendations as they relate to the need for an overall approach that ensures key privacy principles and challenges associated with the nationwide exchange of health information are addressed fully. However, the draft report mischaracterizes a situation in which an employee's computer equipment was stolen from the employee's home. Law enforcement officials subsequently recovered the equipment, which contained information on millions of veterans. After a thorough forensics assessment, Federal Bureau of Investigation officials stated publicly that they were "highly confident" that the veteran data were neither compromised nor accessed. It should be noted that the incident did not take place at the Veterans Health Administration level but at a Departmental level staff office, which was not a Health Insurance Portability and Accountability Act entity. While the context of GAO's report is privacy and security of health-related information, it should be noted that the data breach of personal information was not from a health care system of records. In conclusion, I believe the report's effort to highlight methods of ensuring the privacy of electronic health information is commendable. The enclosure provides technical comments to enable more accuracy and clarity in GAO's report. VA appreciates the opportunity to comment on your draft report. Sincerely, yours, Signed by: R. James Nicholson: Enclosure: [End of section] Appendix VIII: GAO Contacts and Acknowledgments: GAO Contacts: Linda D. Koontz, (202) 512-6240 or koontzl@gao.gov David A. Powner, (202) 512-9286 or pownerd@gao.gov: Acknowledgments: In addition to those named above, Mirko J. Dolak, Amanda C. Gill, Nancy E. Glover, M. Saad Khan, Charles F. Roney, Sylvia L. Shanks, Sushmita L. Srikanth, Teresa F. Tucker, and Morgan F. Walts made key contributions to this report. (310748): FOOTNOTES [1] Health IT is the use of technology to electronically collect, store, retrieve, and transfer clinical, administrative, and financial health information. Health IT is interoperable when systems are able to exchange data accurately, effectively, securely, and consistently with different IT systems, software applications, and networks in such a way that the clinical or operational purposes and meaning of the data are preserved and unaltered. [2] Use of the term "personal health information" throughout this report refers to information relating to the health or health care of an individual that identifies, or can be used to identify, the individual. [3] Executive Order 13335, Incentives for the Use of Health Information Technology and Establishing the Position of the National Health Information Technology Coordinator (Washington, D.C.: Apr. 27, 2004). [4] The National Committee on Vital and Health Statistics was established in 1949 as a public advisory committee that is statutorily authorized to advise the Secretary of HHS on health data, statistics, and national health information policy, including the implementation of health IT standards. [5] The American Health Information Community is a federally chartered advisory committee made up of representatives from both the public and private health care sectors. The community provides input and recommendations to HHS on making health records electronic and providing assurance that the privacy and security of those records are protected. [6] GAO, 21st Century Challenges: Reexamining the Base of the Federal Government, GAO-05-325SP (Washington, D.C.: February 2005). [7] GAO, Information Technology: Benefits Realized for Selected Health Care Functions, GAO-04-224 (Washington, D.C.: Oct. 31, 2003). [8] Executive Order 13335. [9] Department of Health and Human Services, "The Decade of Health Information Technology: Delivering Consumer-centric and Information- rich Health Care: A Framework for Strategic Action" (Washington, D.C.: July 21, 2004). [10] GAO, Health Care: National Strategy Needed to Accelerate the Implementation of Information Technology, GAO-04-947T (Washington, D.C.: July 14, 2004). [11] GAO, Health Information Technology: HHS Is Continuing Efforts to Define Its National Strategy, GAO-06-1071T (Washington, D.C.: Sept. 1, 2006). [12] GAO, Health Information Technology: HHS Is Taking Steps to Develop a National Strategy, GAO-05-628 (Washington, D.C.: May 27, 2005); GAO, Health Information Technology: HHS Is Continuing Efforts to Define a National Strategy, GAO-06-346T (Washington, D.C.: Mar. 15, 2006); GAO- 06-1071T. [13] Breakthrough areas are components of health care and public health that can potentially achieve measurable results in 2 to 3 years. [14] AARP is a nonprofit, nonpartisan membership organization for people age 50 and over. [15] AARP Public Policy Institute; Goldman, Janlori; Stewart, Emily; and Tossell, Beth, Health Privacy Project, The Health Insurance Portability and Accountability Act Privacy Rule and Patient Access to Medical Records, 2006-03 (Washington, D.C.: February 2006). [16] The Privacy Act defines a "system of records" as a group of records under the control of any agency that contains information about an individual and from which information is retrieved by the name of the individual or other personal identifier. [17] Transactions covered by the standards include enrollment and disenrollment in a health plan, eligibility determinations for a health plan, health care payment and remittance advice, premium payments, health claims information and claim status, coordination of benefits, and referral certification and authorizations. [18] The statute requires the Secretary to issue standards for privacy and security. The standards issued by the Secretary are styled as rules. We use that terminology in this report. [19] Ambulatory electronic health records are records of medical care that include diagnosis, observation, treatment, and rehabilitation that is provided on an outpatient basis. Ambulatory care is given to persons who are able to ambulate, or walk about. [20] In May 2006, several of the AHIC work groups recommended the formation of an additional work group composed of privacy, security, clinical, and technology experts from each of the other AHIC work groups. The AHIC Confidentiality, Privacy, and Security Workgroup first convened in August 2006. [21] Identity proofing is the process of providing sufficient information (e.g., identity history, credentials, documents) to establish and verify a person's identity. Identity proofing already takes place throughout many industries, including health care. However, a standard methodology does not exist. [22] User authentication is the process of confirming a person's claimed identity, often used as a way to grant access to data, resources, and other network services. While a user name and password provide a foundational level of authentication, several other techniques, most notably two-factor authentication, have additional capabilities. [23] The Markle Foundation is an organization that works to accelerate the use of emerging information and communication technologies to address critical public needs, particularly in the areas of health and national security. GAO's Mission: The Government Accountability Office, the investigative arm of Congress, exists to support Congress in meeting its constitutional responsibilities and to help improve the performance and accountability of the federal government for the American people. GAO examines the use of public funds; evaluates federal programs and policies; and provides analyses, recommendations, and other assistance to help Congress make informed oversight, policy, and funding decisions. GAO's commitment to good government is reflected in its core values of accountability, integrity, and reliability. Obtaining Copies of GAO Reports and Testimony: The fastest and easiest way to obtain copies of GAO documents at no cost is through the Internet. GAO's Web site ( www.gao.gov ) contains abstracts and full-text files of current reports and testimony and an expanding archive of older products. The Web site features a search engine to help you locate documents using key words and phrases. You can print these documents in their entirety, including charts and other graphics. Each day, GAO issues a list of newly released reports, testimony, and correspondence. GAO posts this list, known as "Today's Reports," on its Web site daily. The list contains links to the full-text document files. To have GAO e-mail this list to you every afternoon, go to www.gao.gov and select "Subscribe to e-mail alerts" under the "Order GAO Products" heading. Order by Mail or Phone: The first copy of each printed report is free. Additional copies are $2 each. A check or money order should be made out to the Superintendent of Documents. GAO also accepts VISA and Mastercard. Orders for 100 or more copies mailed to a single address are discounted 25 percent. Orders should be sent to: U.S. Government Accountability Office 441 G Street NW, Room LM Washington, D.C. 20548: To order by Phone: Voice: (202) 512-6000: TDD: (202) 512-2537: Fax: (202) 512-6061: To Report Fraud, Waste, and Abuse in Federal Programs: Contact: Web site: www.gao.gov/fraudnet/fraudnet.htm E-mail: fraudnet@gao.gov Automated answering system: (800) 424-5454 or (202) 512-7470: Public Affairs: Jeff Nelligan, managing director, NelliganJ@gao.gov (202) 512-4800 U.S. Government Accountability Office, 441 G Street NW, Room 7149 Washington, D.C. 20548:

The Justia Government Accountability Office site republishes public reports retrieved from the U.S. GAO These reports should not be considered official, and do not necessarily reflect the views of Justia.