DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

HHS: Statement of Delay in Enforcement of HIPAA Requirement for Certain CLIA and CLIA-Exempt Laboratories to Revise their Notices of Privacy Practices (NPP)

Posted on September 19, 2013 by Dissent

Dated:  September 19, 2013

The Office for Civil Rights (OCR) of the Department of Health and Human Services announces a delay in its enforcement of the requirement that certain HIPAA–covered laboratories revise their notices of privacy practices (NPPs) to comply with the modifications made to the HIPAA Rules published in the Federal Register on January 25, 2013 (78 FR 5566), commonly known as the “Omnibus Rule,” until further notice. This Enforcement Delay applies to HIPAA-covered laboratories that are subject to CLIA (i.e., CLIA-certified) or exempt from CLIA (i.e., CLIA-exempt) and that are not required to provide an individual with access to his or her laboratory test reports under § 164.524 of the HIPAA Privacy Rule because the information is subject to the exceptions to the right of access at § 164.524(a)(1)(iii)(A) or (B).  The Enforcement Delay does not apply to laboratories that operate as part of a larger legal entity, such as a hospital, and by virtue of that relationship, do not have their own, laboratory-specific, NPPs.  

Background

Under the HIPAA Privacy Rule, a covered entity is required to promptly revise its NPP whenever there is a material change to any of its privacy practices stated in the NPP.  The Omnibus Rule makes a number of material changes to the privacy obligations of HIPAA covered entities, which in turn require revisions to the covered entities’ NPPs by the September 23, 2013, compliance date to ensure that individuals are aware of their new health information privacy protections and rights.

 

In the coming months, the Department anticipates publishing an amendment to the HIPAA Privacy Rule and the Clinical Laboratory Improvement Amendments of 1988 (CLIA) regulations regarding the right of individuals to receive their test reports directly from CLIA and CLIA-exempt laboratories, which was proposed for public comment in the Federal Registeron September 14, 2011 (76 FR 56712). If the amendment is finalized as proposed, it would result in a material change to the privacy practices of the HIPAA-covered laboratories identified above.  Consequently, the affected laboratories would need to ensure that their NPPs inform individuals of this new right and include a brief description of how to exercise the right.

Enforcement Delay

Given the potential proximity of the two rulemakings, OCR is exercising its enforcement discretion to relieve the possible burden on and expense to the HIPAA-covered laboratories identified above of having to revise their NPPs twice within a short period of time, once by September 23, 2013, to comply with the Omnibus Rule, and again by the impending issuance of any CLIA-related amendment to the individual access requirements under § 164.524 of the Privacy Rule.  Specifically, with respect to the HIPAA-covered laboratories identified above, OCR will not take enforcement action or seek to impose civil money penalties where the HIPAA-covered laboratory has not revised its NPP by September 23, 2013, to comply with the Omnibus Rule.  OCR will issue a notice at least 30 days in advance to advise the public when this enforcement delay will end. The notice will be prominently published on OCR’s website at http://www.hhs.gov/ocr/hipaa/, and, if applicable, included in any final rule regarding a CLIA-related amendment to the Privacy Rule.  The public can check the status of any final rule amending the HIPAA Privacy Rule and the CLIA regulations regarding the right of individuals to receive their test reports directly from CLIA and CLIA-exempt laboratories at http://www.reginfo.gov/public/.

 

Category: Uncategorized

Post navigation

← LabMD Responds to FTC Complaint: Claims Agency Lacks Enforcement Jurisdiction
Windhaven Investment Management notifies customers months after vendor-maintained server was hacked (update 3) →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Fresno County fell victim to $1.6M phishing scam in 2020. One suspected has been arrested, another has been indicted.
  • Ransomware Attack on ADP Partner Exposes Broadcom Employee Data
  • Anne Arundel ransomware attack compromised confidential health data, county says
  • Australian national known as “DR32” sentenced in U.S. federal court
  • Alabama Man Sentenced to 14 Months in Connection with Securities and Exchange Commission X Hack that Spiked Bitcoin Prices
  • Japan enacts new Active Cyberdefense Law allowing for offensive cyber operations
  • Breachforums Boss “Pompompurin” to Pay $700k in Healthcare Breach
  • HHS Office for Civil Rights Settles HIPAA Cybersecurity Investigation with Vision Upright MRI
  • Additional 12 Defendants Charged in RICO Conspiracy for over $263 Million Cryptocurrency Thefts, Money Laundering, Home Break-Ins
  • RIBridges firewall worked. But forensic report says hundreds of alarms went unnoticed by Deloitte.

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Massachusetts Senate Committee Approves Robust Comprehensive Privacy Law
  • Montana Becomes First State to Close the Law Enforcement Data Broker Loophole
  • Privacy enforcement under Andrew Ferguson’s FTC
  • “We would be less confidential than Google” – Proton threatens to quit Switzerland over new surveillance law
  • CFPB Quietly Kills Rule to Shield Americans From Data Brokers
  • South Korea fines Temu for data protection violations
  • The BR Privacy & Security Download: May 2025

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.